4, 0x3f}}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x4081}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getpeername$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r8, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r9, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r9, 0x8, '\x00', r10, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000540)=@IORING_OP_ACCEPT={0xd, 0x5c, 0x0, r9, &(0x7f0000000480)=0x80, &(0x7f00000004c0)=@l2tp6, 0x0, 0x800, 0x1}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000240)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=r0, @ANYBLOB="000526bd7000ffdbdf25030000000500020003000000050005001f00000040000180080003000200000000000100", @ANYRES32=r6, @ANYBLOB="080003000200000014000200776730000000000000000000000000000800030001000000080003000100000005000500400000000100018008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="05000500000000000000018000000100", @ANYBLOB="5c69125729465b50140838bb23f6ced33344173465d23b2f40948df6f8bb56fe9c18619363d2a00bf51d3a47507f5f9a1eea8762e11ff31b1dc5c9cecc6ba65ae58d06074275cde29c84d7", @ANYBLOB="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", @ANYRES32=r4, @ANYRESDEC=r4, @ANYRES32=r10, @ANYBLOB="0000030001000000000002006970766c616e310000000000000000000000030003000000"], 0x90}, 0x1, 0x0, 0x0, 0x40408d0}, 0x4000010) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/haltpoll', 0x400c0, 0x10) getpeername$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) 08:47:45 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:45 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0xfffffffffffffe00, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:45 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x810000000000000) 08:47:45 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:46 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r0, 0x200, 0x70bd2c, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20000004}, 0x80) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r2 = socket(0x21, 0xa, 0xfffffff8) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r5, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000400)={0x64, 0x0, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x2f}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x3f}}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x4081}, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) getpeername$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) (async) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r8, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r9, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r9, 0x8, '\x00', r10, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000540)=@IORING_OP_ACCEPT={0xd, 0x5c, 0x0, r9, &(0x7f0000000480)=0x80, &(0x7f00000004c0)=@l2tp6, 0x0, 0x800, 0x1}) (async, rerun: 32) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000240)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=r0, @ANYBLOB="000526bd7000ffdbdf25030000000500020003000000050005001f00000040000180080003000200000000000100", @ANYRES32=r6, @ANYBLOB="080003000200000014000200776730000000000000000000000000000800030001000000080003000100000005000500400000000100018008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="05000500000000000000018000000100", @ANYBLOB="5c69125729465b50140838bb23f6ced33344173465d23b2f40948df6f8bb56fe9c18619363d2a00bf51d3a47507f5f9a1eea8762e11ff31b1dc5c9cecc6ba65ae58d06074275cde29c84d7", @ANYBLOB="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", @ANYRES32=r4, @ANYRESDEC=r4, @ANYRES32=r10, @ANYBLOB="0000030001000000000002006970766c616e310000000000000000000000030003000000"], 0x90}, 0x1, 0x0, 0x0, 0x40408d0}, 0x4000010) (async, rerun: 32) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/haltpoll', 0x400c0, 0x10) getpeername$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) 08:47:46 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x4000000, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:46 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:46 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:47:46 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x7, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:46 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:46 executing program 0: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r0, 0x200, 0x70bd2c, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20000004}, 0x80) (async) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r0, 0x200, 0x70bd2c, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20000004}, 0x80) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket(0x21, 0xa, 0xfffffff8) (async) r2 = socket(0x21, 0xa, 0xfffffff8) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r4 = openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r5, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000400)={0x64, 0x0, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x2f}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x8000}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x3f}}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x4081}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getpeername$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) (async) getpeername$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r8, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r8, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r9, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r9, 0x8, '\x00', r10, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r9, 0x8, '\x00', r10, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000540)=@IORING_OP_ACCEPT={0xd, 0x5c, 0x0, r9, &(0x7f0000000480)=0x80, &(0x7f00000004c0)=@l2tp6, 0x0, 0x800, 0x1}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000240)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=r0, @ANYBLOB="000526bd7000ffdbdf25030000000500020003000000050005001f00000040000180080003000200000000000100", @ANYRES32=r6, @ANYBLOB="080003000200000014000200776730000000000000000000000000000800030001000000080003000100000005000500400000000100018008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="05000500000000000000018000000100", @ANYBLOB="5c69125729465b50140838bb23f6ced33344173465d23b2f40948df6f8bb56fe9c18619363d2a00bf51d3a47507f5f9a1eea8762e11ff31b1dc5c9cecc6ba65ae58d06074275cde29c84d7", @ANYBLOB="040000006f7c63f255bff2f9c41dc9336cd85207aa8d4dfddc6d9700efafb8d22dc41454b63b76b61a3e2ea198876f6c0db0a495f8d685be49836fa254fa9e267bee56fdad4d5abc83468a855c5a5be31352183e5b03eed2952dd23a13050e1ea4f39d033015e5a8606fa6d59243ff994bfffb3e0f3d5557b7280eccfaf538ff3adec21be7fca29200378f392565b7a815d7a020916bc3759e347f8a6239528a2b6db1e41f4fa07c3134fed9499c8f346b0de6b72c250b854fc9ca0c4e7d61f2102ddd10f38570b2fd7ffe37f338e1585fe3c384f54937642cc08ab3cbc62302bd03676bc549006f399b774e6a5a9b99c863398e6791ac698b2fe4933b2ad22d8bef6681cdfd5813aa1b82246905dc73d794329243e6dcc58655eb4f48221d34662520", @ANYRES32=r4, @ANYRESDEC=r4, @ANYRES32=r10, @ANYBLOB="0000030001000000000002006970766c616e310000000000000000000000030003000000"], 0x90}, 0x1, 0x0, 0x0, 0x40408d0}, 0x4000010) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/haltpoll', 0x400c0, 0x10) getpeername$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) 08:47:46 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x5000000, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:46 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x2, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:46 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:46 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x4000000000000000) 08:47:46 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:46 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:46 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'erspan0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x7800, 0xe5, 0x10001, {{0x16, 0x4, 0x2, 0x0, 0x58, 0x67, 0x0, 0x44, 0x4, 0x0, @broadcast, @multicast2, {[@timestamp={0x44, 0x1c, 0xd4, 0x0, 0x6, [0x241, 0x9, 0x6, 0x8000, 0x5, 0xfffffff7]}, @rr={0x7, 0x27, 0xe, [@initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @rand_addr=0x64010102, @multicast1, @remote, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @local, @dev={0xac, 0x14, 0x14, 0x2d}]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x13c, r2, 0x300, 0x70bd29, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x4000}, 0x8080) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), r3) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r11, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, r12, 0xa1a, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x521e}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8001}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x3c}}, 0x4040000) 08:47:46 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x6000000, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:46 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:46 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'erspan0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x7800, 0xe5, 0x10001, {{0x16, 0x4, 0x2, 0x0, 0x58, 0x67, 0x0, 0x44, 0x4, 0x0, @broadcast, @multicast2, {[@timestamp={0x44, 0x1c, 0xd4, 0x0, 0x6, [0x241, 0x9, 0x6, 0x8000, 0x5, 0xfffffff7]}, @rr={0x7, 0x27, 0xe, [@initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @rand_addr=0x64010102, @multicast1, @remote, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @local, @dev={0xac, 0x14, 0x14, 0x2d}]}, @noop]}}}}}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) (async) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x13c, r2, 0x300, 0x70bd29, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x4000}, 0x8080) r11 = socket$nl_generic(0x10, 0x3, 0x10) (async) r12 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), r3) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r11, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, r12, 0xa1a, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x521e}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8001}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x3c}}, 0x4040000) 08:47:46 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x4, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:46 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x300, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:46 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x8100000, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:46 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x5000000000000000) 08:47:46 executing program 0: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'erspan0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x7800, 0xe5, 0x10001, {{0x16, 0x4, 0x2, 0x0, 0x58, 0x67, 0x0, 0x44, 0x4, 0x0, @broadcast, @multicast2, {[@timestamp={0x44, 0x1c, 0xd4, 0x0, 0x6, [0x241, 0x9, 0x6, 0x8000, 0x5, 0xfffffff7]}, @rr={0x7, 0x27, 0xe, [@initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @rand_addr=0x64010102, @multicast1, @remote, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @local, @dev={0xac, 0x14, 0x14, 0x2d}]}, @noop]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'erspan0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x7800, 0xe5, 0x10001, {{0x16, 0x4, 0x2, 0x0, 0x58, 0x67, 0x0, 0x44, 0x4, 0x0, @broadcast, @multicast2, {[@timestamp={0x44, 0x1c, 0xd4, 0x0, 0x6, [0x241, 0x9, 0x6, 0x8000, 0x5, 0xfffffff7]}, @rr={0x7, 0x27, 0xe, [@initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @rand_addr=0x64010102, @multicast1, @remote, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @local, @dev={0xac, 0x14, 0x14, 0x2d}]}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x13c, r2, 0x300, 0x70bd29, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x4000}, 0x8080) r11 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000400), r3) (async) r12 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), r3) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r11, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, r12, 0xa1a, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x521e}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8001}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x3c}}, 0x4040000) 08:47:46 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0xffffffff00000000) 08:47:46 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:46 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x5, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:46 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:46 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x40000000, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:46 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:46 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x2, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:46 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x47ee0000, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:46 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x1d, 0x0, 0x3) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="73697a746e6c31fe4e0092aae3810075", @ANYRES32=0x0, @ANYBLOB="004000010000ec7000000002411200440068000007299078e0000001ac1414aa00940bdf380974b091184e3800072370ac1e0101ac1414aaac1414bbe0000002e0000001ac14141be0000001e0000001"]}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000240)={'gretap0\x00', &(0x7f0000000180)={'ip_vti0\x00', 0x0, 0x80, 0x20, 0x8, 0xffffffff, {{0x1a, 0x4, 0x2, 0x9, 0x68, 0x65, 0x0, 0x5, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, {[@noop, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0xe6, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@empty, 0xfffffffd}, {@private=0xa010100, 0x9}, {@loopback, 0x80}, {@multicast2}, {@remote, 0x8}, {@dev={0xac, 0x14, 0x14, 0x41}}, {@dev={0xac, 0x14, 0x14, 0x2e}, 0xe88f}, {@broadcast, 0x9}]}]}}}}}) getpeername$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000700)={&(0x7f0000000900)=ANY=[@ANYBLOB="91b21cae94359785a97c3d45f7094c9e85fed849e1e8bfcb25f688485461eb12abe3543335be02b9eb22554ced30a2dee0ace51b00f042e8515a03", @ANYRES16=0x0, @ANYBLOB="02002cbd7000fcdbdf250000000006000e00810000000500210001000000"], 0x24}, 0x1, 0x0, 0x0, 0x60000841}, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) r8 = accept4$packet(r1, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000800)=0x14, 0x80800) accept$packet(r8, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000880)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000300)={'tunl0\x00', 0x0, 0x1, 0x1, 0x3, 0x10000, {{0x27, 0x4, 0x0, 0x0, 0x9c, 0x66, 0x0, 0x2, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@cipso={0x86, 0x5c, 0x2, [{0x1, 0x8, "c21e083809f5"}, {0x6, 0x12, "2ce465da083daaa88c23b69eff11b765"}, {0x1, 0x5, "2eb717"}, {0x0, 0xc, "ece144afef7d2277c2c9"}, {0x2, 0xc, "f43d26890bab2712ad9b"}, {0x5, 0x5, "143b9a"}, {0x7, 0x12, "75faa043736e268c6faf0f945528ae13"}, {0x1, 0x8, "3c982d17bf29"}]}, @ssrr={0x89, 0x7, 0x44, [@remote]}, @lsrr={0x83, 0x23, 0xa3, [@dev={0xac, 0x14, 0x14, 0x1e}, @broadcast, @empty, @empty, @remote, @empty, @multicast1, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d00)=ANY=[@ANYBLOB="98010000", @ANYRES16=0x0, @ANYBLOB="000829bd7000ffdbdf25060000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="3400018014000200626f6e645f736c6176655f30000000000800030000000000140002006970365f7674693000000000000000004c00018008000100", @ANYRES64=r6, @ANYRESDEC=r2, @ANYRES32=0x0, @ANYBLOB="cb5d15be", @ANYRES32=r3, @ANYBLOB="140002006d61637674617030000000000000000008000300020000007400018014000200626f6e645f736c6176655f310000000014000200000000000000000000000000000000000800030002000000080003000300000008000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="eba150d17ee7ec7436163a4add8737876db05010a1504d5329d042278f7d3fdfe8d392bb", @ANYRES32=0x0, @ANYBLOB="200001800800030000000000140002007767310000000000000000000000000014000180080003000600000008000100", @ANYRES32=r6, @ANYBLOB="300001800800030000000000140002006c6f0000000000000000000000000000080003000200000008000100", @ANYRES32=r9, @ANYBLOB="0c00018008000100", @ANYRES32=r10, @ANYBLOB="aabba8551eb3a96e5edfcef9942a495655bf09c219f165a404bbf08bdc6c5a73c61d7a9585c79f64076b4b28a02d33f23fc582d4bcf723f8127e2aa8cdbdb7ae"], 0x198}, 0x1, 0x0, 0x0, 0x1}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:46 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:47 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x7, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:47 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) [ 1027.689696][T12892] can: request_module (can-proto-3) failed. 08:47:47 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x3, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:47 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x87000000, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:47 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x8, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:47 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) (async, rerun: 64) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (rerun: 64) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:47 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xffff0000, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:47 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:47 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x87, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:47 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/parport', 0x3, 0x40) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x48010) timerfd_settime(r1, 0x993d399e5989d378, &(0x7f0000000040)={{}, {0x77359400}}, &(0x7f0000000080)) 08:47:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x1d, 0x0, 0x3) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="73697a746e6c31fe4e0092aae3810075", @ANYRES32=0x0, @ANYBLOB="004000010000ec7000000002411200440068000007299078e0000001ac1414aa00940bdf380974b091184e3800072370ac1e0101ac1414aaac1414bbe0000002e0000001ac14141be0000001e0000001"]}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000240)={'gretap0\x00', &(0x7f0000000180)={'ip_vti0\x00', 0x0, 0x80, 0x20, 0x8, 0xffffffff, {{0x1a, 0x4, 0x2, 0x9, 0x68, 0x65, 0x0, 0x5, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, {[@noop, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0xe6, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@empty, 0xfffffffd}, {@private=0xa010100, 0x9}, {@loopback, 0x80}, {@multicast2}, {@remote, 0x8}, {@dev={0xac, 0x14, 0x14, 0x41}}, {@dev={0xac, 0x14, 0x14, 0x2e}, 0xe88f}, {@broadcast, 0x9}]}]}}}}}) getpeername$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) (async, rerun: 32) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (rerun: 32) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000700)={&(0x7f0000000900)=ANY=[@ANYBLOB="91b21cae94359785a97c3d45f7094c9e85fed849e1e8bfcb25f688485461eb12abe3543335be02b9eb22554ced30a2dee0ace51b00f042e8515a03", @ANYRES16=0x0, @ANYBLOB="02002cbd7000fcdbdf250000000006000e00810000000500210001000000"], 0x24}, 0x1, 0x0, 0x0, 0x60000841}, 0x0) (async) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) (async) r8 = accept4$packet(r1, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000800)=0x14, 0x80800) accept$packet(r8, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000880)=0x14) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000300)={'tunl0\x00', 0x0, 0x1, 0x1, 0x3, 0x10000, {{0x27, 0x4, 0x0, 0x0, 0x9c, 0x66, 0x0, 0x2, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@cipso={0x86, 0x5c, 0x2, [{0x1, 0x8, "c21e083809f5"}, {0x6, 0x12, "2ce465da083daaa88c23b69eff11b765"}, {0x1, 0x5, "2eb717"}, {0x0, 0xc, "ece144afef7d2277c2c9"}, {0x2, 0xc, "f43d26890bab2712ad9b"}, {0x5, 0x5, "143b9a"}, {0x7, 0x12, "75faa043736e268c6faf0f945528ae13"}, {0x1, 0x8, "3c982d17bf29"}]}, @ssrr={0x89, 0x7, 0x44, [@remote]}, @lsrr={0x83, 0x23, 0xa3, [@dev={0xac, 0x14, 0x14, 0x1e}, @broadcast, @empty, @empty, @remote, @empty, @multicast1, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d00)=ANY=[@ANYBLOB="98010000", @ANYRES16=0x0, @ANYBLOB="000829bd7000ffdbdf25060000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="3400018014000200626f6e645f736c6176655f30000000000800030000000000140002006970365f7674693000000000000000004c00018008000100", @ANYRES64=r6, @ANYRESDEC=r2, @ANYRES32=0x0, @ANYBLOB="cb5d15be", @ANYRES32=r3, @ANYBLOB="140002006d61637674617030000000000000000008000300020000007400018014000200626f6e645f736c6176655f310000000014000200000000000000000000000000000000000800030002000000080003000300000008000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="eba150d17ee7ec7436163a4add8737876db05010a1504d5329d042278f7d3fdfe8d392bb", @ANYRES32=0x0, @ANYBLOB="200001800800030000000000140002007767310000000000000000000000000014000180080003000600000008000100", @ANYRES32=r6, @ANYBLOB="300001800800030000000000140002006c6f0000000000000000000000000000080003000200000008000100", @ANYRES32=r9, @ANYBLOB="0c00018008000100", @ANYRES32=r10, @ANYBLOB="aabba8551eb3a96e5edfcef9942a495655bf09c219f165a404bbf08bdc6c5a73c61d7a9585c79f64076b4b28a02d33f23fc582d4bcf723f8127e2aa8cdbdb7ae"], 0x198}, 0x1, 0x0, 0x0, 0x1}, 0x40) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x1d, 0x0, 0x3) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="73697a746e6c31fe4e0092aae3810075", @ANYRES32=0x0, @ANYBLOB="004000010000ec7000000002411200440068000007299078e0000001ac1414aa00940bdf380974b091184e3800072370ac1e0101ac1414aaac1414bbe0000002e0000001ac14141be0000001e0000001"]}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000240)={'gretap0\x00', &(0x7f0000000180)={'ip_vti0\x00', 0x0, 0x80, 0x20, 0x8, 0xffffffff, {{0x1a, 0x4, 0x2, 0x9, 0x68, 0x65, 0x0, 0x5, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, {[@noop, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0xe6, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@empty, 0xfffffffd}, {@private=0xa010100, 0x9}, {@loopback, 0x80}, {@multicast2}, {@remote, 0x8}, {@dev={0xac, 0x14, 0x14, 0x41}}, {@dev={0xac, 0x14, 0x14, 0x2e}, 0xe88f}, {@broadcast, 0x9}]}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000240)={'gretap0\x00', &(0x7f0000000180)={'ip_vti0\x00', 0x0, 0x80, 0x20, 0x8, 0xffffffff, {{0x1a, 0x4, 0x2, 0x9, 0x68, 0x65, 0x0, 0x5, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, {[@noop, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x4c, 0xe6, 0x1, 0x7, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@empty, 0xfffffffd}, {@private=0xa010100, 0x9}, {@loopback, 0x80}, {@multicast2}, {@remote, 0x8}, {@dev={0xac, 0x14, 0x14, 0x41}}, {@dev={0xac, 0x14, 0x14, 0x2e}, 0xe88f}, {@broadcast, 0x9}]}]}}}}}) getpeername$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000700)={&(0x7f0000000900)=ANY=[@ANYBLOB="91b21cae94359785a97c3d45f7094c9e85fed849e1e8bfcb25f688485461eb12abe3543335be02b9eb22554ced30a2dee0ace51b00f042e8515a03", @ANYRES16=0x0, @ANYBLOB="02002cbd7000fcdbdf250000000006000e00810000000500210001000000"], 0x24}, 0x1, 0x0, 0x0, 0x60000841}, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) accept4$packet(r1, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000800)=0x14, 0x80800) (async) r8 = accept4$packet(r1, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000800)=0x14, 0x80800) accept$packet(r8, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14) (async) accept$packet(r8, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000008c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000880)=0x14) (async) getpeername$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000880)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000300)={'tunl0\x00', 0x0, 0x1, 0x1, 0x3, 0x10000, {{0x27, 0x4, 0x0, 0x0, 0x9c, 0x66, 0x0, 0x2, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@cipso={0x86, 0x5c, 0x2, [{0x1, 0x8, "c21e083809f5"}, {0x6, 0x12, "2ce465da083daaa88c23b69eff11b765"}, {0x1, 0x5, "2eb717"}, {0x0, 0xc, "ece144afef7d2277c2c9"}, {0x2, 0xc, "f43d26890bab2712ad9b"}, {0x5, 0x5, "143b9a"}, {0x7, 0x12, "75faa043736e268c6faf0f945528ae13"}, {0x1, 0x8, "3c982d17bf29"}]}, @ssrr={0x89, 0x7, 0x44, [@remote]}, @lsrr={0x83, 0x23, 0xa3, [@dev={0xac, 0x14, 0x14, 0x1e}, @broadcast, @empty, @empty, @remote, @empty, @multicast1, @loopback]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000005c0)={&(0x7f0000000d00)=ANY=[@ANYBLOB="98010000", @ANYRES16=0x0, @ANYBLOB="000829bd7000ffdbdf25060000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="3400018014000200626f6e645f736c6176655f30000000000800030000000000140002006970365f7674693000000000000000004c00018008000100", @ANYRES64=r6, @ANYRESDEC=r2, @ANYRES32=0x0, @ANYBLOB="cb5d15be", @ANYRES32=r3, @ANYBLOB="140002006d61637674617030000000000000000008000300020000007400018014000200626f6e645f736c6176655f310000000014000200000000000000000000000000000000000800030002000000080003000300000008000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="eba150d17ee7ec7436163a4add8737876db05010a1504d5329d042278f7d3fdfe8d392bb", @ANYRES32=0x0, @ANYBLOB="200001800800030000000000140002007767310000000000000000000000000014000180080003000600000008000100", @ANYRES32=r6, @ANYBLOB="300001800800030000000000140002006c6f0000000000000000000000000000080003000200000008000100", @ANYRES32=r9, @ANYBLOB="0c00018008000100", @ANYRES32=r10, @ANYBLOB="aabba8551eb3a96e5edfcef9942a495655bf09c219f165a404bbf08bdc6c5a73c61d7a9585c79f64076b4b28a02d33f23fc582d4bcf723f8127e2aa8cdbdb7ae"], 0x198}, 0x1, 0x0, 0x0, 0x1}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:47 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 64) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) (rerun: 64) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:47 executing program 0: socket$pptp(0x18, 0x1, 0x2) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) bind$packet(r1, &(0x7f0000000100)={0x11, 0xf7, 0x0, 0x1, 0x6, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}}, 0x14) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xeef}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}]}, 0x24}}, 0x4000) 08:47:47 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:47 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x5, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:47 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfe, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:47 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/parport', 0x3, 0x40) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x48010) timerfd_settime(r1, 0x993d399e5989d378, &(0x7f0000000040)={{}, {0x77359400}}, &(0x7f0000000080)) (async) timerfd_settime(r1, 0x993d399e5989d378, &(0x7f0000000040)={{}, {0x77359400}}, &(0x7f0000000080)) [ 1028.095576][T12916] can: request_module (can-proto-3) failed. [ 1028.119749][T12923] can: request_module (can-proto-3) failed. 08:47:47 executing program 0: socket$pptp(0x18, 0x1, 0x2) (async) socket$pptp(0x18, 0x1, 0x2) r0 = socket$packet(0x11, 0x2, 0x300) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) bind$packet(r1, &(0x7f0000000100)={0x11, 0xf7, 0x0, 0x1, 0x6, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}}, 0x14) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xeef}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}]}, 0x24}}, 0x4000) 08:47:47 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x6, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:47 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x300, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:47 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x3, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:47 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x87, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:47 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x500, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:47 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:47 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/parport', 0x3, 0x40) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x48010) timerfd_settime(r1, 0x993d399e5989d378, &(0x7f0000000040)={{}, {0x77359400}}, &(0x7f0000000080)) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/parport', 0x3, 0x40) (async) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x48010) (async) timerfd_settime(r1, 0x993d399e5989d378, &(0x7f0000000040)={{}, {0x77359400}}, &(0x7f0000000080)) (async) 08:47:47 executing program 0: socket$pptp(0x18, 0x1, 0x2) (async) r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) bind$packet(r1, &(0x7f0000000100)={0x11, 0xf7, 0x0, 0x1, 0x6, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}}, 0x14) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xeef}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}]}, 0x24}}, 0x4000) 08:47:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7fffffff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000070}, 0x4000000) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:47 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x300, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:47 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)="a7a003c2041c5e07bb0781a3dd1a96fa80290e2812af67d0852f311e6f05e3e645937565cb9fdce1760fb21525806ff4e04c9a9bcd7654c331268c9e3b23ab5f2026c7b1194a8801e087bdcaa40566e3d750cdb51620613fa369e1a2ba7c9253d591f0640339090d5f1ea607f96fdf8985ba45f8b29b6a6e1c9cb6ad000ba9afa28f966f5e0ad3484929394dffbcb840a95a1181c6c939de4fe9ea4d76ee80f6109596047591f800242f7588beb74b42e2ab2c592ddf1356cab490e3c05bacb75308cc86b3db2f8c88e137d24d538d90b3f6b1", 0xd3) 08:47:47 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x7, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:47 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x9}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x81}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x1) clock_gettime(0x6, &(0x7f0000000040)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/pata_oldpiix', 0x1, 0x88) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001180)={0x14, r3, 0x101}, 0x14}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000280)="0704ebce26f5b217099e314aef08ef63faa0e1a8106176e8adeda097916038e0236b2f3ad7c68bceec564c2e611d275855876492c953c61ad36b792fe609119360961b36aaeae94e6a7a6a734e0a09baf48ad786b2d87eaa8ef821d5a8d25e091da8b762f23fa1c7329000bdd31f83", 0x6f, r4}, 0x68) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r3, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8001}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4c081}, 0x10) 08:47:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7fffffff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000070}, 0x4000000) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7fffffff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000070}, 0x4000000) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:47:47 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x600, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:47 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x500, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:48 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)="a7a003c2041c5e07bb0781a3dd1a96fa80290e2812af67d0852f311e6f05e3e645937565cb9fdce1760fb21525806ff4e04c9a9bcd7654c331268c9e3b23ab5f2026c7b1194a8801e087bdcaa40566e3d750cdb51620613fa369e1a2ba7c9253d591f0640339090d5f1ea607f96fdf8985ba45f8b29b6a6e1c9cb6ad000ba9afa28f966f5e0ad3484929394dffbcb840a95a1181c6c939de4fe9ea4d76ee80f6109596047591f800242f7588beb74b42e2ab2c592ddf1356cab490e3c05bacb75308cc86b3db2f8c88e137d24d538d90b3f6b1", 0xd3) 08:47:48 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x9}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x81}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x1) (async) clock_gettime(0x6, &(0x7f0000000040)) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/pata_oldpiix', 0x1, 0x88) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001180)={0x14, r3, 0x101}, 0x14}}, 0x0) (async) r4 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000280)="0704ebce26f5b217099e314aef08ef63faa0e1a8106176e8adeda097916038e0236b2f3ad7c68bceec564c2e611d275855876492c953c61ad36b792fe609119360961b36aaeae94e6a7a6a734e0a09baf48ad786b2d87eaa8ef821d5a8d25e091da8b762f23fa1c7329000bdd31f83", 0x6f, r4}, 0x68) (async) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r3, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8001}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4c081}, 0x10) 08:47:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7fffffff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000070}, 0x4000000) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7fffffff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000070}, 0x4000000) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:47:48 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:48 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x600, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:48 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x9}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x81}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x1) (async) clock_gettime(0x6, &(0x7f0000000040)) (async, rerun: 64) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/pata_oldpiix', 0x1, 0x88) (rerun: 64) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) (rerun: 32) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001180)={0x14, r3, 0x101}, 0x14}}, 0x0) (async) r4 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000280)="0704ebce26f5b217099e314aef08ef63faa0e1a8106176e8adeda097916038e0236b2f3ad7c68bceec564c2e611d275855876492c953c61ad36b792fe609119360961b36aaeae94e6a7a6a734e0a09baf48ad786b2d87eaa8ef821d5a8d25e091da8b762f23fa1c7329000bdd31f83", 0x6f, r4}, 0x68) (async, rerun: 64) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r3, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8001}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4c081}, 0x10) (rerun: 64) 08:47:48 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x700, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:48 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$l2tp6(0xa, 0x2, 0x73) connect$l2tp6(r1, &(0x7f0000000000)={0xa, 0x0, 0x40002, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fffffff}, 0x20) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r2 = accept$packet(r0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x7}, 0x4) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="a8641797", @ANYRES16=r3, @ANYBLOB="100027bd70a2d600efdcd37f840008000aff0400000006001d00060000000800110800020000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) 08:47:48 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000180)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000002c0)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x80, r3, 0x400, 0x8001, 0x25dfdbfc, {}, [@HEADER={0x4}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x80}}, 0x41) socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) connect$packet(r5, &(0x7f0000000300)={0x11, 0x2, r4, 0x1, 0x6}, 0x14) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r6, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="01000000", @ANYRES16=0x0, @ANYBLOB="04002cbd7000fddbdf251100000005003800000000000500300001000000"], 0x24}, 0x1, 0x0, 0x0, 0x80d4}, 0x200420a4) 08:47:48 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)="a7a003c2041c5e07bb0781a3dd1a96fa80290e2812af67d0852f311e6f05e3e645937565cb9fdce1760fb21525806ff4e04c9a9bcd7654c331268c9e3b23ab5f2026c7b1194a8801e087bdcaa40566e3d750cdb51620613fa369e1a2ba7c9253d591f0640339090d5f1ea607f96fdf8985ba45f8b29b6a6e1c9cb6ad000ba9afa28f966f5e0ad3484929394dffbcb840a95a1181c6c939de4fe9ea4d76ee80f6109596047591f800242f7588beb74b42e2ab2c592ddf1356cab490e3c05bacb75308cc86b3db2f8c88e137d24d538d90b3f6b1", 0xd3) 08:47:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket(0x2a, 0x0, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000180)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000002c0)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x80, r3, 0x400, 0x8001, 0x25dfdbfc, {}, [@HEADER={0x4}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x80}}, 0x41) (async) socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) connect$packet(r5, &(0x7f0000000300)={0x11, 0x2, r4, 0x1, 0x6}, 0x14) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$BATADV_CMD_GET_VLAN(r6, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="01000000", @ANYRES16=0x0, @ANYBLOB="04002cbd7000fddbdf251100000005003800000000000500300001000000"], 0x24}, 0x1, 0x0, 0x0, 0x80d4}, 0x200420a4) 08:47:48 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x810, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:48 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x810, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r1) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000180)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000002c0)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x80, r3, 0x400, 0x8001, 0x25dfdbfc, {}, [@HEADER={0x4}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x80}}, 0x41) socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) connect$packet(r5, &(0x7f0000000300)={0x11, 0x2, r4, 0x1, 0x6}, 0x14) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$BATADV_CMD_GET_VLAN(r6, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="01000000", @ANYRES16=0x0, @ANYBLOB="04002cbd7000fddbdf251100000005003800000000000500300001000000"], 0x24}, 0x1, 0x0, 0x0, 0x80d4}, 0x200420a4) 08:47:48 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$l2tp6(0xa, 0x2, 0x73) connect$l2tp6(r1, &(0x7f0000000000)={0xa, 0x0, 0x40002, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fffffff}, 0x20) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r2 = accept$packet(r0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x7}, 0x4) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="a8641797", @ANYRES16=r3, @ANYBLOB="100027bd70a2d600efdcd37f840008000aff0400000006001d00060000000800110800020000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) socket$packet(0x11, 0x2, 0x300) (async) socket$l2tp6(0xa, 0x2, 0x73) (async) connect$l2tp6(r1, &(0x7f0000000000)={0xa, 0x0, 0x40002, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fffffff}, 0x20) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) accept$packet(r0, 0x0, &(0x7f0000000040)) (async) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x7}, 0x4) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="a8641797", @ANYRES16=r3, @ANYBLOB="100027bd70a2d600efdcd37f840008000aff0400000006001d00060000000800110800020000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) (async) 08:47:48 executing program 3: socket$packet(0x11, 0x2, 0x300) socket(0x2c, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/50, 0x32, 0x2, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x2, 0x4) 08:47:48 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x300, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:48 executing program 3: socket$packet(0x11, 0x2, 0x300) socket(0x2c, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/50, 0x32, 0x2, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x2, 0x4) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2c, 0x5, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/50, 0x32, 0x2, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x2, 0x4) (async) 08:47:48 executing program 3: socket$packet(0x11, 0x2, 0x300) socket(0x2c, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/50, 0x32, 0x2, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x2, 0x4) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2c, 0x5, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/50, 0x32, 0x2, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x2, 0x4) (async) 08:47:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x10, 0x800, 0x2) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:48 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x1008, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:48 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000000)=0x2, 0x4) socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/vhost_iotlb', 0x3000, 0x80) timerfd_gettime(r1, &(0x7f0000000080)) 08:47:48 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x1008, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:48 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket$l2tp6(0xa, 0x2, 0x73) connect$l2tp6(r1, &(0x7f0000000000)={0xa, 0x0, 0x40002, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7fffffff}, 0x20) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async, rerun: 64) r2 = accept$packet(r0, 0x0, &(0x7f0000000040)) (rerun: 64) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x7}, 0x4) (async) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="a8641797", @ANYRES16=r3, @ANYBLOB="100027bd70a2d600efdcd37f840008000aff0400000006001d00060000000800110800020000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) 08:47:48 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:48 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4000, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x10, 0x800, 0x2) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x10, 0x800, 0x2) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:48 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/54, 0x2d, 0x2, 0x0, 0x5b) 08:47:48 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x4000, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x3, 0x4) recvfrom$packet(r2, &(0x7f0000000600)=""/45, 0x2d, 0x11102, 0x0, 0x0) 08:47:48 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x47ee, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) r1 = socket(0x2a, 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x3, 0x4) (async) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x3, 0x4) recvfrom$packet(r2, &(0x7f0000000600)=""/45, 0x2d, 0x11102, 0x0, 0x0) 08:47:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket(0x2a, 0x0, 0x0) (async) socket$pppoe(0x18, 0x1, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) (async, rerun: 32) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (rerun: 32) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 64) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x3, 0x4) (rerun: 64) recvfrom$packet(r2, &(0x7f0000000600)=""/45, 0x2d, 0x11102, 0x0, 0x0) 08:47:49 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000000)=0x2, 0x4) socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/vhost_iotlb', 0x3000, 0x80) timerfd_gettime(r1, &(0x7f0000000080)) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000000)=0x2, 0x4) (async) socket$packet(0x11, 0x2, 0x300) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/vhost_iotlb', 0x3000, 0x80) (async) timerfd_gettime(r1, &(0x7f0000000080)) (async) 08:47:49 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x8700, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:49 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x8700, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:49 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x2, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2c, 0x3, 0x544) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = socket(0x28, 0x80000, 0xffffffff) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r2, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}]}, 0x34}}, 0x4001) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2c, 0x3, 0x544) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r1 = socket(0x28, 0x80000, 0xffffffff) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r2, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}]}, 0x34}}, 0x4001) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:49 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000000)=0x2, 0x4) (async) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000000)=0x2, 0x4) socket$packet(0x11, 0x2, 0x300) (async) socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/vhost_iotlb', 0x3000, 0x80) timerfd_gettime(r1, &(0x7f0000000080)) 08:47:49 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x3, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:49 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xeffd, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2c, 0x3, 0x544) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = socket(0x28, 0x80000, 0xffffffff) (async, rerun: 64) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) (rerun: 64) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r2, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}]}, 0x34}}, 0x4001) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:49 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0xee47, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:49 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/54, 0x2d, 0x2, 0x0, 0x5b) 08:47:49 executing program 3: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7fff}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x23e}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x6}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x6}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x4}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x5800}, 0x44000) r1 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) recvfrom$l2tp6(0xffffffffffffffff, &(0x7f0000000180)=""/194, 0xc2, 0x40000001, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @broadcast}}, 0x20) 08:47:49 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:49 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:49 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfcfd, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:49 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x5, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:49 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfdef, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:49 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x6, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:49 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x3}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:49 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfdfc, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:49 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/54, 0x2d, 0x2, 0x0, 0x5b) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000000)=""/54, 0x2d, 0x2, 0x0, 0x5b) (async) 08:47:49 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/44, 0x2c, 0x2141, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x8000, 0x6, 0x3, 0x2030}, {0x2, 0x8, 0x81, 0x3}, {0x1, 0x5, 0x1, 0x1d9}, {0x6, 0x81}]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x1, r3, 0x1, 0x6, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x30}}, 0x14) 08:47:49 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/44, 0x2c, 0x2141, 0x0, 0x0) (async) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x8000, 0x6, 0x3, 0x2030}, {0x2, 0x8, 0x81, 0x3}, {0x1, 0x5, 0x1, 0x1d9}, {0x6, 0x81}]}, 0x10) (async, rerun: 64) r1 = socket$packet(0x11, 0x3, 0x300) (async, rerun: 64) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x1, r3, 0x1, 0x6, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x30}}, 0x14) 08:47:49 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:49 executing program 3: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7fff}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x23e}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x6}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x6}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x4}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x5800}, 0x44000) (async) r1 = socket$packet(0x11, 0x2, 0x300) (async, rerun: 32) socket(0x2a, 0x0, 0x0) (async, rerun: 32) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) recvfrom$l2tp6(0xffffffffffffffff, &(0x7f0000000180)=""/194, 0xc2, 0x40000001, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @broadcast}}, 0x20) 08:47:49 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/44, 0x2c, 0x2141, 0x0, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x8000, 0x6, 0x3, 0x2030}, {0x2, 0x8, 0x81, 0x3}, {0x1, 0x5, 0x1, 0x1d9}, {0x6, 0x81}]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x1, r3, 0x1, 0x6, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x30}}, 0x14) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000000)=""/44, 0x2c, 0x2141, 0x0, 0x0) (async) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x8000, 0x6, 0x3, 0x2030}, {0x2, 0x8, 0x81, 0x3}, {0x1, 0x5, 0x1, 0x1d9}, {0x6, 0x81}]}, 0x10) (async) socket$packet(0x11, 0x3, 0x300) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x1, r3, 0x1, 0x6, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x30}}, 0x14) (async) 08:47:49 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfdfe, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:49 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x87, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:49 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, 0x0, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_MRU={0x6, 0x1d, 0xfffc}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x81}, @L2TP_ATTR_SEND_SEQ={0x5}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r2 = accept$packet(r0, 0x0, &(0x7f0000000140)) accept4$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000001c0)=0x14, 0x800) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:49 executing program 3: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7fff}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x23e}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x6}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x6}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x4}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x5800}, 0x44000) r1 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) recvfrom$l2tp6(0xffffffffffffffff, &(0x7f0000000180)=""/194, 0xc2, 0x40000001, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @broadcast}}, 0x20) 08:47:50 executing program 2: r0 = getpid() ptrace$setregset(0x4205, r0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300)=r0, 0x12) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ptrace$setregset(0x4205, r0, 0x3, &(0x7f0000000340)={&(0x7f0000000640)="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", 0x1000}) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r4, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008144) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/radio_si470x_usb', 0x680200, 0x85) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getpeername$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000400)=0x14) getsockname$packet(r5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r12 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r12, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r12, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r12, 0x8, '\x00', r13, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000001640)={0x198, r4, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x198}}, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000100)) r14 = accept$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) setsockopt$packet_add_memb(r14, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) 08:47:50 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x300, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:50 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, 0x0, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_MRU={0x6, 0x1d, 0xfffc}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x81}, @L2TP_ATTR_SEND_SEQ={0x5}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) accept$packet(r0, 0x0, &(0x7f0000000140)) (async) r2 = accept$packet(r0, 0x0, &(0x7f0000000140)) accept4$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000001c0)=0x14, 0x800) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:50 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x5}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:50 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfdff, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:50 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'syztnl0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000800107fffffff00010000400c0040006600001f2990787f000001ac1414aa8910fde14de2fb123968107f11c75383890fe5e0000001ac14140bac1414bb440c8801e00000010000000800"]}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r7, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xf8, r2, 0x10, 0x70bd27, 0x25dfdbfb, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0xffffffffffffffb7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x60008001}, 0x8004) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:50 executing program 2: r0 = getpid() ptrace$setregset(0x4205, r0, 0x0, 0x0) (async) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300)=r0, 0x12) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) ptrace$setregset(0x4205, r0, 0x3, &(0x7f0000000340)={&(0x7f0000000640)="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", 0x1000}) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r4, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008144) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/radio_si470x_usb', 0x680200, 0x85) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) getpeername$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000400)=0x14) getsockname$packet(r5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r12 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r12, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r12, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r12, 0x8, '\x00', r13, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000001640)={0x198, r4, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x198}}, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000100)) (async) r14 = accept$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) setsockopt$packet_add_memb(r14, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) 08:47:50 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) (async) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) (async) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'syztnl0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000800107fffffff00010000400c0040006600001f2990787f000001ac1414aa8910fde14de2fb123968107f11c75383890fe5e0000001ac14140bac1414bb440c8801e00000010000000800"]}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'syztnl0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="73050000006c3000000000000000000031340abb32d45c55911cdc2f557dd54ed2f609308fa6801e787be61998b8055e1cb0bd6e8e1b67215b13e8efe857df3e9a8defc134a3c0beaad19d30bd2efeb79e032c48ed00df6cd03f71b365a500b15939a47209b225e31e55f7a2e11bec9f11e37895a97841be81e58826bc1ffd78397e8c6ec406b5960792fad97c6059cb2dce895ce5d7cc4b76c9f4e8740e6af2f4985559e6f94b5971388980c724e35f5c6ba9f4f0305fa5060debea111463cc50acacee5c275863f3597d65976d49f9221c3e8f0d2f2b794dde43d32d19bb860f2d6d012b183f5b9a7eddc946eda709bd75d157595f1d4f112ca40d79a86714778840a7964e85d9078e4ee77c96f024ff9624ff000000fa0a7060500e84f619c18825ceb476c2af5d28a4bdf1201baf60805ea4e14eda944da3f97540307fd58dcd4d1249e882cb1f6011be95d890e165a1986080d4fe2a", @ANYRES32=0x0, @ANYBLOB="000800107fffffff00010000400c0040006600001f2990787f000001ac1414aa8910fde14de2fb123968107f11c75383890fe5e0000001ac14140bac1414bb440c8801e00000010000000800"]}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r7, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xf8, r2, 0x10, 0x70bd27, 0x25dfdbfb, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0xffffffffffffffb7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x60008001}, 0x8004) (async) sendmsg$ETHTOOL_MSG_FEATURES_GET(r7, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xf8, r2, 0x10, 0x70bd27, 0x25dfdbfb, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0xffffffffffffffb7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x60008001}, 0x8004) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:50 executing program 2: r0 = getpid() ptrace$setregset(0x4205, r0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300)=r0, 0x12) (async) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300)=r0, 0x12) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ptrace$setregset(0x4205, r0, 0x3, &(0x7f0000000340)={&(0x7f0000000640)="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", 0x1000}) (async) ptrace$setregset(0x4205, r0, 0x3, &(0x7f0000000340)={&(0x7f0000000640)="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", 0x1000}) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) (async) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r4, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008144) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/radio_si470x_usb', 0x680200, 0x85) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getpeername$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000400)=0x14) getsockname$packet(r5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r12 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r12, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r12, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r12, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r12, 0x8, '\x00', r13, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000001640)={0x198, r4, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x198}}, 0x0) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000100)) (async) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000100)) accept$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) (async) r14 = accept$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) setsockopt$packet_add_memb(r14, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) 08:47:50 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (rerun: 32) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) (async) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) (async) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'syztnl0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000800107fffffff00010000400c0040006600001f2990787f000001ac1414aa8910fde14de2fb123968107f11c75383890fe5e0000001ac14140bac1414bb440c8801e00000010000000800"]}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) (async) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$ETHTOOL_MSG_FEATURES_GET(r7, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xf8, r2, 0x10, 0x70bd27, 0x25dfdbfb, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0xffffffffffffffb7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x60008001}, 0x8004) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:50 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x6}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:50 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x500, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:50 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.max_usage_in_bytes\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:50 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfe00, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:50 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, 0x0, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_MRU={0x6, 0x1d, 0xfffc}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x81}, @L2TP_ATTR_SEND_SEQ={0x5}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) (async) r2 = accept$packet(r0, 0x0, &(0x7f0000000140)) accept4$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000001c0)=0x14, 0x800) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:50 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14, 0x81800) getpeername$packet(r3, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000540)={r4, 0xffffffffffffffff}, 0x4) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x13, r5, 0x86e38000) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r4) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r7, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0xc00018d}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x90, r8, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x1f}, @ETHTOOL_A_LINKINFO_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x9}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0xf7}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x8}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x80}]}, 0x90}, 0x1, 0x0, 0x0, 0x40}, 0x14) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xa8, r2, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x10}, 0x2004000) setsockopt$packet_int(r0, 0x107, 0x10, &(0x7f0000000000), 0x4) 08:47:50 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x87}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:50 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x600, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:50 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfefd, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:50 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.max_usage_in_bytes\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:50 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000000)=0xffffffffffffffff, 0x12) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:50 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x300}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:50 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000000)=0xffffffffffffffff, 0x12) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) write$cgroup_pid(r0, &(0x7f0000000000)=0xffffffffffffffff, 0x12) (async) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:47:50 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14, 0x81800) getpeername$packet(r3, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000540)={r4, 0xffffffffffffffff}, 0x4) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x13, r5, 0x86e38000) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r4) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r7, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0xc00018d}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x90, r8, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x1f}, @ETHTOOL_A_LINKINFO_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x9}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0xf7}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x8}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x80}]}, 0x90}, 0x1, 0x0, 0x0, 0x40}, 0x14) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xa8, r2, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x10}, 0x2004000) (async) setsockopt$packet_int(r0, 0x107, 0x10, &(0x7f0000000000), 0x4) 08:47:50 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x810, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:50 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfffd, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:50 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14, 0x81800) getpeername$packet(r3, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r2, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000540)={r4, 0xffffffffffffffff}, 0x4) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x13, r5, 0x86e38000) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) (async) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r4) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r7, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0xc00018d}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x90, r8, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x1f}, @ETHTOOL_A_LINKINFO_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x9}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0xf7}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x3}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x8}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x80}]}, 0x90}, 0x1, 0x0, 0x0, 0x40}, 0x14) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xa8, r2, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x10}, 0x2004000) setsockopt$packet_int(r0, 0x107, 0x10, &(0x7f0000000000), 0x4) 08:47:50 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000000)=0xffffffffffffffff, 0x12) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:50 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x500}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:50 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = accept$packet(r0, &(0x7f0000000000), &(0x7f0000000080)=0x14) accept4$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14, 0x80000) recvfrom$packet(r0, &(0x7f0000000040)=""/27, 0x1b, 0x2, 0x0, 0x0) 08:47:50 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfeffff, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:50 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async, rerun: 64) socket(0x2a, 0x0, 0x0) (async, rerun: 64) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.rsvd.max_usage_in_bytes\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:50 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x1008, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:50 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x600}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:50 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x1000000, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:50 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200100, 0x140) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:50 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = accept$packet(r0, &(0x7f0000000000), &(0x7f0000000080)=0x14) accept4$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14, 0x80000) (async) recvfrom$packet(r0, &(0x7f0000000040)=""/27, 0x1b, 0x2, 0x0, 0x0) 08:47:51 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x80, 0x20, 0x80000000, 0xc0db, {{0x11, 0x4, 0x2, 0x24, 0x44, 0x65, 0x0, 0xd8, 0x2f, 0x0, @loopback, @empty, {[@end, @timestamp_addr={0x44, 0x2c, 0x8a, 0x1, 0xd, [{@multicast2, 0x7fffffff}, {@loopback, 0x9}, {@rand_addr=0x64010102}, {@empty, 0x85a}, {@multicast1, 0x4000}]}]}}}}}) sendmsg$FOU_CMD_DEL(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40884}, 0xc000) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) connect$l2tp6(r3, &(0x7f0000000380)={0xa, 0x0, 0x1, @mcast1, 0xffffffff, 0x4}, 0x20) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0) 08:47:51 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x2000000, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:51 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x810}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:51 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x4000, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:51 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x3000000, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:51 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = accept$packet(r0, &(0x7f0000000000), &(0x7f0000000080)=0x14) accept4$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14, 0x80000) (async) recvfrom$packet(r0, &(0x7f0000000040)=""/27, 0x1b, 0x2, 0x0, 0x0) 08:47:51 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r1 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) r2 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x80, 0x20, 0x80000000, 0xc0db, {{0x11, 0x4, 0x2, 0x24, 0x44, 0x65, 0x0, 0xd8, 0x2f, 0x0, @loopback, @empty, {[@end, @timestamp_addr={0x44, 0x2c, 0x8a, 0x1, 0xd, [{@multicast2, 0x7fffffff}, {@loopback, 0x9}, {@rand_addr=0x64010102}, {@empty, 0x85a}, {@multicast1, 0x4000}]}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x80, 0x20, 0x80000000, 0xc0db, {{0x11, 0x4, 0x2, 0x24, 0x44, 0x65, 0x0, 0xd8, 0x2f, 0x0, @loopback, @empty, {[@end, @timestamp_addr={0x44, 0x2c, 0x8a, 0x1, 0xd, [{@multicast2, 0x7fffffff}, {@loopback, 0x9}, {@rand_addr=0x64010102}, {@empty, 0x85a}, {@multicast1, 0x4000}]}]}}}}}) sendmsg$FOU_CMD_DEL(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40884}, 0xc000) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) connect$l2tp6(r3, &(0x7f0000000380)={0xa, 0x0, 0x1, @mcast1, 0xffffffff, 0x4}, 0x20) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0) 08:47:51 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x1008}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:51 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x47ee, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:51 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x4000000, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:51 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/48, 0x2d, 0x40005120, 0x0, 0xfffffdca) 08:47:51 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x4000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:51 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x8700, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:51 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200100, 0x140) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:51 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x5000000, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:51 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x48) r1 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) r2 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x80, 0x20, 0x80000000, 0xc0db, {{0x11, 0x4, 0x2, 0x24, 0x44, 0x65, 0x0, 0xd8, 0x2f, 0x0, @loopback, @empty, {[@end, @timestamp_addr={0x44, 0x2c, 0x8a, 0x1, 0xd, [{@multicast2, 0x7fffffff}, {@loopback, 0x9}, {@rand_addr=0x64010102}, {@empty, 0x85a}, {@multicast1, 0x4000}]}]}}}}}) sendmsg$FOU_CMD_DEL(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40884}, 0xc000) (async) sendmsg$FOU_CMD_DEL(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x3c, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40884}, 0xc000) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) connect$l2tp6(r3, &(0x7f0000000380)={0xa, 0x0, 0x1, @mcast1, 0xffffffff, 0x4}, 0x20) (async) connect$l2tp6(r3, &(0x7f0000000380)={0xa, 0x0, 0x1, @mcast1, 0xffffffff, 0x4}, 0x20) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0) (async) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0xc0) 08:47:51 executing program 2: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/48, 0x2d, 0x40005120, 0x0, 0xfffffdca) 08:47:51 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/48, 0x2d, 0x40005120, 0x0, 0xfffffdca) 08:47:51 executing program 2: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0xc, 0x0, 0xfffffe01, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3}}) r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$ETHTOOL_MSG_EEE_GET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x884a0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 08:47:51 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x47ee}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:51 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0xee47, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:51 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x6000000, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:51 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x8700}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:51 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:51 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x7000000, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:51 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0xee47}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:51 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200100, 0x140) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200100, 0x140) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:47:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/38, 0x26, 0x2000, 0x0, 0x0) 08:47:52 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x800000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:52 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x8000000, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:52 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x3}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:52 executing program 2: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0xc, 0x0, 0xfffffe01, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3}}) (async, rerun: 64) r0 = socket$packet(0x11, 0x2, 0x300) (rerun: 64) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$ETHTOOL_MSG_EEE_GET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x884a0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 08:47:52 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) accept$packet(r0, 0x0, &(0x7f0000000000)) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002dbd7000fddbdf2507000000040001803400018014000200766c616e30000000000000000000000014003f0000150af9b39bb300000000006c6176655f310000", @ANYRES32=r3, @ANYBLOB], 0x4c}, 0x1, 0x0, 0x0, 0x880}, 0x4000) 08:47:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000000)=""/38, 0x26, 0x2000, 0x0, 0x0) 08:47:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000000)=""/38, 0x26, 0x2000, 0x0, 0x0) 08:47:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$packet_int(r1, 0x107, 0x3, &(0x7f0000000000)=0x7fffffff, 0x4) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:52 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x8100000, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:52 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:52 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x1000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) setsockopt$packet_int(r1, 0x107, 0x3, &(0x7f0000000000)=0x7fffffff, 0x4) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:52 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) accept$packet(r0, 0x0, &(0x7f0000000000)) (async) accept$packet(r0, 0x0, &(0x7f0000000000)) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002dbd7000fddbdf2507000000040001803400018014000200766c616e30000000000000000000000014003f0000150af9b39bb300000000006c6176655f310000", @ANYRES32=r3, @ANYBLOB], 0x4c}, 0x1, 0x0, 0x0, 0x880}, 0x4000) 08:47:52 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x2000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:52 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x40000000, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:52 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x5}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:52 executing program 0: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) accept$packet(r0, 0x0, &(0x7f0000000000)) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) (async) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002dbd7000fddbdf2507000000040001803400018014000200766c616e30000000000000000000000014003f0000150af9b39bb300000000006c6176655f310000", @ANYRES32=r3, @ANYBLOB], 0x4c}, 0x1, 0x0, 0x0, 0x880}, 0x4000) 08:47:52 executing program 2: syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0xc, 0x0, 0xfffffe01, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3}}) (async) r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$ETHTOOL_MSG_EEE_GET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x884a0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 08:47:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) setsockopt$packet_int(r1, 0x107, 0x3, &(0x7f0000000000)=0x7fffffff, 0x4) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:52 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x3000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:52 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @local}, 0x10) 08:47:52 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x6}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:52 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x87000000, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:52 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x4000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:52 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x87}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:52 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xeffdffff, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:52 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x5000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:52 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x300}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:52 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4044}, 0xc805) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x400, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4004}, 0x20000000) 08:47:52 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfcfdffff, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:52 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x6000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:52 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x500}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:52 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @local}, 0x10) 08:47:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x28}, 0x1, 0x0, 0x0, 0x8880}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.read_bps_device\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:52 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x8100000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:52 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x600}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:52 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfefdffff, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:52 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4044}, 0xc805) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x400, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4004}, 0x20000000) 08:47:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x28}, 0x1, 0x0, 0x0, 0x8880}, 0x0) (async) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x28}, 0x1, 0x0, 0x0, 0x8880}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.read_bps_device\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:53 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfffdffff, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:53 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x40000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:53 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x810}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:53 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x47ee0000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:53 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4044}, 0xc805) (async) sendmsg$BATADV_CMD_GET_ORIGINATORS(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4044}, 0xc805) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x400, 0x70bd2c, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4004}, 0x20000000) 08:47:53 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @local}, 0x10) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @local}, 0x10) (async) 08:47:53 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x87000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:53 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfffffdef, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:53 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x1008}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 64) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x28}, 0x1, 0x0, 0x0, 0x8880}, 0x0) (async, rerun: 64) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.read_bps_device\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x2000000) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:53 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0xfffffffffffffe9b) 08:47:53 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfffffdfc, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:53 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0xffff0000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:53 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x4000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:53 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x47ee}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:53 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x80000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:53 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfffffdfe, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:53 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x8700}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:53 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0xfffffffffffffe9b) 08:47:53 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x3002, 0x0, 0x0) 08:47:53 executing program 3: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x2000000) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:53 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x3002, 0x0, 0x0) 08:47:53 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x3002, 0x0, 0x0) 08:47:53 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mem_exclusive\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="35000077af59c2f4203100fed6c11b3e9fe528453d26004c1765bb475acfd842b5566e6d79d726827137ce61debb51765df94303f1cc93b228bf3be03ea355e72a2aba4e2eaea4e7cc0dc9e41858cd088ea7cb67da1ca055d439919761528b501429393873245208d45617f2a4e27a9606e9a5a97e2026a8f6a6e175c0ba6eaeac9dbf5fb8572bf4e0ee5f73f2533b82cc46814396f5aceb3ab149a2bd813242fd79e7d2ee8b1530adebc156", @ANYRES32=0x0, @ANYBLOB="00200087fffffffa000000094118004400670000002f9078ac1e0001ac1414aa01890bb70a01010000000000830ff4ac1e0101ffffffffe000000207132bffffffffffffffffac14142c640101010000"]}) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) getpeername$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r8, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r12 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r12, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r12, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r12, 0x8, '\x00', r13, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) connect$packet(r10, &(0x7f0000000580)={0x11, 0x19, r13, 0x1, 0x9, 0x6, @broadcast}, 0x14) getsockname$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r3, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x400c0a0}, 0x40) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:53 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x100000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:53 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfffffdff, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:53 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0xee47}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:53 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x200000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:53 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x800000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x2000000) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x2000000) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:47:53 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket$inet6_udp(0xa, 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0xfffffffffffffe9b) 08:47:53 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xfffffe00, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:53 executing program 3: socket$packet(0x11, 0x2, 0x300) r0 = socket(0xa, 0x5, 0x1fffc000) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x0, 0x0, 0x0) 08:47:53 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x300000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:53 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x1000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:53 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mem_exclusive\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) (async) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r1) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="35000077af59c2f4203100fed6c11b3e9fe528453d26004c1765bb475acfd842b5566e6d79d726827137ce61debb51765df94303f1cc93b228bf3be03ea355e72a2aba4e2eaea4e7cc0dc9e41858cd088ea7cb67da1ca055d439919761528b501429393873245208d45617f2a4e27a9606e9a5a97e2026a8f6a6e175c0ba6eaeac9dbf5fb8572bf4e0ee5f73f2533b82cc46814396f5aceb3ab149a2bd813242fd79e7d2ee8b1530adebc156", @ANYRES32=0x0, @ANYBLOB="00200087fffffffa000000094118004400670000002f9078ac1e0001ac1414aa01890bb70a01010000000000830ff4ac1e0101ffffffffe000000207132bffffffffffffffffac14142c640101010000"]}) (async) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) (async) getpeername$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r8, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) (async) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r12 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r12, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r12, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r12, 0x8, '\x00', r13, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) connect$packet(r10, &(0x7f0000000580)={0x11, 0x19, r13, 0x1, 0x9, 0x6, @broadcast}, 0x14) (async) getsockname$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r3, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x400c0a0}, 0x40) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:53 executing program 3: socket$packet(0x11, 0x2, 0x300) r0 = socket(0xa, 0x5, 0x1fffc000) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x0, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0xa, 0x5, 0x1fffc000) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x0, 0x0, 0x0) (async) 08:47:53 executing program 0: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mem_exclusive\x00', 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mem_exclusive\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="35000077af59c2f4203100fed6c11b3e9fe528453d26004c1765bb475acfd842b5566e6d79d726827137ce61debb51765df94303f1cc93b228bf3be03ea355e72a2aba4e2eaea4e7cc0dc9e41858cd088ea7cb67da1ca055d439919761528b501429393873245208d45617f2a4e27a9606e9a5a97e2026a8f6a6e175c0ba6eaeac9dbf5fb8572bf4e0ee5f73f2533b82cc46814396f5aceb3ab149a2bd813242fd79e7d2ee8b1530adebc156", @ANYRES32=0x0, @ANYBLOB="00200087fffffffa000000094118004400670000002f9078ac1e0001ac1414aa01890bb70a01010000000000830ff4ac1e0101ffffffffe000000207132bffffffffffffffffac14142c640101010000"]}) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) getpeername$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r8, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r12 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r12, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r12, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r12, 0x8, '\x00', r13, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) connect$packet(r10, &(0x7f0000000580)={0x11, 0x19, r13, 0x1, 0x9, 0x6, @broadcast}, 0x14) getsockname$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0}, &(0x7f0000000340)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r3, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x400c0a0}, 0x40) (async) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)={0x180, r3, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x400c0a0}, 0x40) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:53 executing program 3: socket$packet(0x11, 0x2, 0x300) r0 = socket(0xa, 0x5, 0x1fffc000) (async, rerun: 32) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x0, 0x0, 0x0) 08:47:53 executing program 3: getitimer(0x0, &(0x7f0000000080)) r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:54 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000001, 0x100010, r1, 0x47f11000) sendto$packet(r0, &(0x7f0000000000)="0f41372cddb50f69c1d05e313ad6e6a437dc61f436e61904c33cca3f48e761ffd38cb1e2b040870c4520963abed6514b5c873061fb7e940df16c69864d45bf5227c6b116d0931e1bb2b3fdafa109a4182aff8b04e54a970034c3c729ec33334a2dce4b18e1d187a357ad54476f7c4a0306744015c1418663dda9c55a1601fc80ac20a1700a13401257abb96ef24f76e0ef02c40ff0132d0d516275a25f819b7087138066ba4c65911d5c484d224a00db02cb7dca43255f768f8e4c5cc50bc105393a1b316d055562fd160895ba612471c467d249406e260252cbe33f", 0xdc, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r2, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x4) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r4 = getpgid(0x0) write$cgroup_pid(r3, &(0x7f0000000240)=r4, 0x12) 08:47:54 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0xffffffff, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:54 executing program 2: r0 = shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x7000) shmdt(r0) shmdt(r0) r1 = io_uring_setup(0x1dc7, &(0x7f0000000040)={0x0, 0xb638, 0x1000, 0x1, 0x251}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)="e9f2e0f26e302fd83f8726536b1c171e9df83115c7b9599d16ffdf3133d70c41d7f06f4037d6a5fbe44e66bb71aabc89cc2dd1327fe3a44b25ab8266cedaaf935940047ba59e982a7b71705ddc83731703ace81a4faf4fd64b823893e03cb2e99a00665954ae6dd63a41f377850ed9d7143f80baca82e90e9445ef6d43849b551243e00e7ea495f948396855a28b6bfb8a2242a4b438146ef91a8766ee4e32cc37135e", 0xa3, r1}, 0x68) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/block/loop4', 0x1, 0x4) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r1, 0x7, &(0x7f0000000100)=r2, 0x1) r3 = socket$packet(0x11, 0x2, 0x300) prctl$PR_GET_SECUREBITS(0x1b) bind$packet(r3, &(0x7f0000000000)={0x11, 0x2, 0x0, 0x1, 0x2, 0x6, @remote}, 0x14) 08:47:54 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x2000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:54 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x400000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:54 executing program 2: r0 = shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x7000) shmdt(r0) shmdt(r0) r1 = io_uring_setup(0x1dc7, &(0x7f0000000040)={0x0, 0xb638, 0x1000, 0x1, 0x251}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)="e9f2e0f26e302fd83f8726536b1c171e9df83115c7b9599d16ffdf3133d70c41d7f06f4037d6a5fbe44e66bb71aabc89cc2dd1327fe3a44b25ab8266cedaaf935940047ba59e982a7b71705ddc83731703ace81a4faf4fd64b823893e03cb2e99a00665954ae6dd63a41f377850ed9d7143f80baca82e90e9445ef6d43849b551243e00e7ea495f948396855a28b6bfb8a2242a4b438146ef91a8766ee4e32cc37135e", 0xa3, r1}, 0x68) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/block/loop4', 0x1, 0x4) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r1, 0x7, &(0x7f0000000100)=r2, 0x1) r3 = socket$packet(0x11, 0x2, 0x300) prctl$PR_GET_SECUREBITS(0x1b) bind$packet(r3, &(0x7f0000000000)={0x11, 0x2, 0x0, 0x1, 0x2, 0x6, @remote}, 0x14) shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x7000) (async) shmdt(r0) (async) shmdt(r0) (async) io_uring_setup(0x1dc7, &(0x7f0000000040)={0x0, 0xb638, 0x1000, 0x1, 0x251}) (async) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)="e9f2e0f26e302fd83f8726536b1c171e9df83115c7b9599d16ffdf3133d70c41d7f06f4037d6a5fbe44e66bb71aabc89cc2dd1327fe3a44b25ab8266cedaaf935940047ba59e982a7b71705ddc83731703ace81a4faf4fd64b823893e03cb2e99a00665954ae6dd63a41f377850ed9d7143f80baca82e90e9445ef6d43849b551243e00e7ea495f948396855a28b6bfb8a2242a4b438146ef91a8766ee4e32cc37135e", 0xa3, r1}, 0x68) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/block/loop4', 0x1, 0x4) (async) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r1, 0x7, &(0x7f0000000100)=r2, 0x1) (async) socket$packet(0x11, 0x2, 0x300) (async) prctl$PR_GET_SECUREBITS(0x1b) (async) bind$packet(r3, &(0x7f0000000000)={0x11, 0x2, 0x0, 0x1, 0x2, 0x6, @remote}, 0x14) (async) 08:47:54 executing program 2: r0 = shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x7000) shmdt(r0) (async) shmdt(r0) (async) r1 = io_uring_setup(0x1dc7, &(0x7f0000000040)={0x0, 0xb638, 0x1000, 0x1, 0x251}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)="e9f2e0f26e302fd83f8726536b1c171e9df83115c7b9599d16ffdf3133d70c41d7f06f4037d6a5fbe44e66bb71aabc89cc2dd1327fe3a44b25ab8266cedaaf935940047ba59e982a7b71705ddc83731703ace81a4faf4fd64b823893e03cb2e99a00665954ae6dd63a41f377850ed9d7143f80baca82e90e9445ef6d43849b551243e00e7ea495f948396855a28b6bfb8a2242a4b438146ef91a8766ee4e32cc37135e", 0xa3, r1}, 0x68) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/block/loop4', 0x1, 0x4) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r1, 0x7, &(0x7f0000000100)=r2, 0x1) (async) r3 = socket$packet(0x11, 0x2, 0x300) prctl$PR_GET_SECUREBITS(0x1b) (async) bind$packet(r3, &(0x7f0000000000)={0x11, 0x2, 0x0, 0x1, 0x2, 0x6, @remote}, 0x14) 08:47:54 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:54 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x3000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:54 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x128, 0x0, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x40040}, 0x890) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000380)={'gretap0\x00', &(0x7f0000000300)={'syztnl1\x00', r2, 0x8000, 0x8000, 0x1, 0x3, {{0x9, 0x4, 0x1, 0x1, 0x24, 0x68, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010101, {[@generic={0x7, 0xb, "9a3f7e1e3a9ab165fe"}, @generic={0x86, 0x3, "91"}]}}}}}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000008c0)={0x4, 0x4}, 0x4) openat$cgroup_int(r6, &(0x7f0000000840)='cgroup.clone_children\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r5, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000640)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000003c0)={0x1cc, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x45}, 0x20008005) r8 = socket$packet(0x11, 0x2, 0x300) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0), r1) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f00000007c0)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)=ANY=[@ANYBLOB="58050000", @ANYRES16=r9, @ANYBLOB="00022dbd7000fbdbdf250000000006000200010000000500220000000000060002000100000005000700020000000c00160005000000000000000800090002000000080009000200000006001d0001000000"], 0x58}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) recvfrom$packet(r8, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:54 executing program 3: getitimer(0x0, &(0x7f0000000080)) r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:54 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000001, 0x100010, r1, 0x47f11000) sendto$packet(r0, &(0x7f0000000000)="0f41372cddb50f69c1d05e313ad6e6a437dc61f436e61904c33cca3f48e761ffd38cb1e2b040870c4520963abed6514b5c873061fb7e940df16c69864d45bf5227c6b116d0931e1bb2b3fdafa109a4182aff8b04e54a970034c3c729ec33334a2dce4b18e1d187a357ad54476f7c4a0306744015c1418663dda9c55a1601fc80ac20a1700a13401257abb96ef24f76e0ef02c40ff0132d0d516275a25f819b7087138066ba4c65911d5c484d224a00db02cb7dca43255f768f8e4c5cc50bc105393a1b316d055562fd160895ba612471c467d249406e260252cbe33f", 0xdc, 0x0, 0x0, 0x0) (async) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r2, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x4) (async, rerun: 64) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (rerun: 64) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r4 = getpgid(0x0) write$cgroup_pid(r3, &(0x7f0000000240)=r4, 0x12) 08:47:54 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x500000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:54 executing program 3: getitimer(0x0, &(0x7f0000000080)) (async) r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:54 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:54 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x4000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:54 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000001, 0x100010, r1, 0x47f11000) sendto$packet(r0, &(0x7f0000000000)="0f41372cddb50f69c1d05e313ad6e6a437dc61f436e61904c33cca3f48e761ffd38cb1e2b040870c4520963abed6514b5c873061fb7e940df16c69864d45bf5227c6b116d0931e1bb2b3fdafa109a4182aff8b04e54a970034c3c729ec33334a2dce4b18e1d187a357ad54476f7c4a0306744015c1418663dda9c55a1601fc80ac20a1700a13401257abb96ef24f76e0ef02c40ff0132d0d516275a25f819b7087138066ba4c65911d5c484d224a00db02cb7dca43255f768f8e4c5cc50bc105393a1b316d055562fd160895ba612471c467d249406e260252cbe33f", 0xdc, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) (async) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r2, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x4) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getpgid(0x0) (async) r4 = getpgid(0x0) write$cgroup_pid(r3, &(0x7f0000000240)=r4, 0x12) 08:47:54 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:54 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x600000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:54 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x8) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/54, 0x36, 0x2, 0x0, 0x35) 08:47:54 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x8) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/54, 0x36, 0x2, 0x0, 0x35) socket$packet(0x11, 0x2, 0x300) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x8) (async) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000000)=""/54, 0x36, 0x2, 0x0, 0x35) (async) 08:47:54 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x10) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x128, 0x0, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x40040}, 0x890) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000380)={'gretap0\x00', &(0x7f0000000300)={'syztnl1\x00', r2, 0x8000, 0x8000, 0x1, 0x3, {{0x9, 0x4, 0x1, 0x1, 0x24, 0x68, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010101, {[@generic={0x7, 0xb, "9a3f7e1e3a9ab165fe"}, @generic={0x86, 0x3, "91"}]}}}}}) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) pipe2$watch_queue(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000008c0)={0x4, 0x4}, 0x4) openat$cgroup_int(r6, &(0x7f0000000840)='cgroup.clone_children\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r5, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000640)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000003c0)={0x1cc, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x45}, 0x20008005) (async) r8 = socket$packet(0x11, 0x2, 0x300) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0), r1) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f00000007c0)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)=ANY=[@ANYBLOB="58050000", @ANYRES16=r9, @ANYBLOB="00022dbd7000fbdbdf250000000006000200010000000500220000000000060002000100000005000700020000000c00160005000000000000000800090002000000080009000200000006001d0001000000"], 0x58}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) (async) recvfrom$packet(r8, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:54 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:47:54 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:54 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x8) (async) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000000)=""/54, 0x36, 0x2, 0x0, 0x35) 08:47:54 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x810000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:54 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x5000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:54 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001180)={0x14, r2, 0x101}, 0x14}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2004}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r2, 0x10, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6}]}, 0x24}}, 0x40) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/imon', 0x494203, 0x0) write$vga_arbiter(r3, &(0x7f0000000140)=@unlock_all, 0xb) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0xfff, 0x0, r4, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x5}, 0x48) r5 = socket$packet(0x11, 0x2, 0x300) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r3, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x20, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) recvfrom$packet(r5, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:54 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x10) (async) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x128, 0x0, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x40040}, 0x890) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000380)={'gretap0\x00', &(0x7f0000000300)={'syztnl1\x00', r2, 0x8000, 0x8000, 0x1, 0x3, {{0x9, 0x4, 0x1, 0x1, 0x24, 0x68, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010101, {[@generic={0x7, 0xb, "9a3f7e1e3a9ab165fe"}, @generic={0x86, 0x3, "91"}]}}}}}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000008c0)={0x4, 0x4}, 0x4) (async) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000008c0)={0x4, 0x4}, 0x4) openat$cgroup_int(r6, &(0x7f0000000840)='cgroup.clone_children\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r5, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r5, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000640)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000003c0)={0x1cc, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x45}, 0x20008005) socket$packet(0x11, 0x2, 0x300) (async) r8 = socket$packet(0x11, 0x2, 0x300) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000006c0), r1) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f00000007c0)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)=ANY=[@ANYBLOB="58050000", @ANYRES16=r9, @ANYBLOB="00022dbd7000fbdbdf250000000006000200010000000500220000000000060002000100000005000700020000000c00160005000000000000000800090002000000080009000200000006001d0001000000"], 0x58}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) recvfrom$packet(r8, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:54 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:54 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x6000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:54 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x4000000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:54 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x4, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:54 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x8100000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:54 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x47ee000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:54 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x5, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:54 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x40000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:54 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x8700000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:54 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:54 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x47ee0000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:55 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) connect$packet(r1, &(0x7f0000000080)={0x11, 0x1b, r2, 0x1, 0x7, 0x6, @link_local}, 0x14) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:55 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x87000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:55 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001180)={0x14, r2, 0x101}, 0x14}}, 0x0) (async, rerun: 32) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2004}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r2, 0x10, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6}]}, 0x24}}, 0x40) (async, rerun: 32) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/imon', 0x494203, 0x0) write$vga_arbiter(r3, &(0x7f0000000140)=@unlock_all, 0xb) (async) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0xfff, 0x0, r4, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x5}, 0x48) (async) r5 = socket$packet(0x11, 0x2, 0x300) (async) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r3, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x20, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) recvfrom$packet(r5, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:55 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0xffff000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:55 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x14, 0x3, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x6}, @generic={0x2, 0xb, 0xc, 0x80, 0x20}], &(0x7f0000000040)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000000c0)={0x2, 0x6, 0x1f, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000000100)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000140)=[{0x4, 0x2, 0x1, 0x5}, {0x5, 0x4, 0x4, 0x9}, {0x1, 0x3, 0xf, 0x7}, {0x3, 0x5, 0x9, 0x4}], 0x10, 0xa091}, 0x90) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)=r1) 08:47:55 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x7, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:55 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001180)={0x14, r2, 0x101}, 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2004}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r2, 0x10, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6}]}, 0x24}}, 0x40) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/imon', 0x494203, 0x0) write$vga_arbiter(r3, &(0x7f0000000140)=@unlock_all, 0xb) (async) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0xfff, 0x0, r4, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x5}, 0x48) r5 = socket$packet(0x11, 0x2, 0x300) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r3, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x20, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) (async) recvfrom$packet(r5, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:55 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x14, 0x3, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x6}, @generic={0x2, 0xb, 0xc, 0x80, 0x20}], &(0x7f0000000040)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000000c0)={0x2, 0x6, 0x1f, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000000100)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000140)=[{0x4, 0x2, 0x1, 0x5}, {0x5, 0x4, 0x4, 0x9}, {0x1, 0x3, 0xf, 0x7}, {0x3, 0x5, 0x9, 0x4}], 0x10, 0xa091}, 0x90) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)=r1) 08:47:55 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:55 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0xffff0000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:55 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:55 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x80000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:55 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x3}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:55 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x100000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:55 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) connect$packet(r1, &(0x7f0000000080)={0x11, 0x1b, r2, 0x1, 0x7, 0x6, @link_local}, 0x14) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:55 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x87, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:55 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x14, 0x3, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x6}, @generic={0x2, 0xb, 0xc, 0x80, 0x20}], &(0x7f0000000040)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000000c0)={0x2, 0x6, 0x1f, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000000100)=[0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000140)=[{0x4, 0x2, 0x1, 0x5}, {0x5, 0x4, 0x4, 0x9}, {0x1, 0x3, 0xf, 0x7}, {0x3, 0x5, 0x9, 0x4}], 0x10, 0xa091}, 0x90) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000240)=r1) 08:47:55 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:55 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req={0x1, 0x5, 0x8}, 0x10) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:55 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) connect$packet(r1, &(0x7f0000000080)={0x11, 0x1b, r2, 0x1, 0x7, 0x6, @link_local}, 0x14) (async, rerun: 64) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (rerun: 64) 08:47:55 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfe, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:55 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x5}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:55 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x200000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:55 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000100)='./file0\x00'}, 0x18) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000140)='cpuset.mems\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x14, r3, 0x1, 0x8003}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17a12dbd7000fbdbdf251400000008000700dc000000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0xc0) 08:47:55 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x300000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:55 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000100)='./file0\x00'}, 0x18) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000140)='cpuset.mems\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x14, r3, 0x1, 0x8003}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17a12dbd7000fbdbdf251400000008000700dc000000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0xc0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000100)='./file0\x00'}, 0x18) (async) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r2, &(0x7f0000000140)='cpuset.mems\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x14, r3, 0x1, 0x8003}, 0x14}}, 0x0) (async) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17a12dbd7000fbdbdf251400000008000700dc000000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0xc0) (async) 08:47:55 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x6}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:55 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x300, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:55 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000100)='./file0\x00'}, 0x18) r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket(0x2a, 0x0, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r2, &(0x7f0000000140)='cpuset.mems\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x14, r3, 0x1, 0x8003}, 0x14}}, 0x0) (async) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="17a12dbd7000fbdbdf251400000008000700dc000000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0xc0) 08:47:55 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x400000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:56 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x87}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:56 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x10000, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x29, 0x0, 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r3, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PORT={0x6}, @FOU_ATTR_TYPE={0x5}, @FOU_ATTR_IPPROTO={0x5}]}, 0x34}}, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x50, r3, 0x200, 0x70bd2a, 0xfffffff9, {}, [@FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x5e}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast1}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}, @FOU_ATTR_IFINDEX={0x8}]}, 0x50}}, 0x4000000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r4) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$BATADV_CMD_GET_ORIGINATORS(r4, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x74, r5, 0x4, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xcdb6}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10001}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x8001}]}, 0x74}}, 0x20000801) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='blkio.throttle.read_iops_device\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:56 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x500, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:56 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) (async, rerun: 32) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (rerun: 32) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req={0x1, 0x5, 0x8}, 0x10) (async, rerun: 64) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (rerun: 64) 08:47:56 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x500000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x29, 0x0, 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r3, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PORT={0x6}, @FOU_ATTR_TYPE={0x5}, @FOU_ATTR_IPPROTO={0x5}]}, 0x34}}, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x50, r3, 0x200, 0x70bd2a, 0xfffffff9, {}, [@FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x5e}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast1}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}, @FOU_ATTR_IFINDEX={0x8}]}, 0x50}}, 0x4000000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r4) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$BATADV_CMD_GET_ORIGINATORS(r4, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x74, r5, 0x4, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xcdb6}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10001}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x8001}]}, 0x74}}, 0x20000801) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='blkio.throttle.read_iops_device\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x29, 0x0, 0x3) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r3, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PORT={0x6}, @FOU_ATTR_TYPE={0x5}, @FOU_ATTR_IPPROTO={0x5}]}, 0x34}}, 0x0) (async) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x50, r3, 0x200, 0x70bd2a, 0xfffffff9, {}, [@FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x5e}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast1}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}, @FOU_ATTR_IFINDEX={0x8}]}, 0x50}}, 0x4000000) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r4) (async) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) (async) sendmsg$BATADV_CMD_GET_ORIGINATORS(r4, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x74, r5, 0x4, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xcdb6}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10001}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x8001}]}, 0x74}}, 0x20000801) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='blkio.throttle.read_iops_device\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket(0x29, 0x0, 0x3) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r3, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PORT={0x6}, @FOU_ATTR_TYPE={0x5}, @FOU_ATTR_IPPROTO={0x5}]}, 0x34}}, 0x0) (async) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x50, r3, 0x200, 0x70bd2a, 0xfffffff9, {}, [@FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x5e}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast1}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}, @FOU_ATTR_IFINDEX={0x8}]}, 0x50}}, 0x4000000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r4) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) sendmsg$BATADV_CMD_GET_ORIGINATORS(r4, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x74, r5, 0x4, 0x70bd25, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xcdb6}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10001}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x8001}]}, 0x74}}, 0x20000801) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='blkio.throttle.read_iops_device\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000040)=""/61, 0x3d, 0x12023, 0x0, 0x0) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000000000)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000040)=""/61, 0x3d, 0x12023, 0x0, 0x0) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000000000)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000040)=""/61, 0x3d, 0x12023, 0x0, 0x0) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/hid_apple', 0x199000, 0x46) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000000c0)={0x1c, 0x0, &(0x7f0000000040)=[@register_looper, @increfs={0x40046304, 0x2}, @request_death={0x400c630e, 0x1}], 0x11, 0x0, &(0x7f0000000080)="60c37cc47bf6870fe811aea5de5937ac86"}) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:56 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x300}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:56 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x10000, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x10000, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:47:56 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x600, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:56 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req={0x1, 0x5, 0x8}, 0x10) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req={0x1, 0x5, 0x8}, 0x10) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:47:56 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x600000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:56 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) setsockopt$packet_int(r3, 0x107, 0xb, &(0x7f0000000100)=0xc7, 0x4) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/hid_apple', 0x199000, 0x46) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/hid_apple', 0x199000, 0x46) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000000c0)={0x1c, 0x0, &(0x7f0000000040)=[@register_looper, @increfs={0x40046304, 0x2}, @request_death={0x400c630e, 0x1}], 0x11, 0x0, &(0x7f0000000080)="60c37cc47bf6870fe811aea5de5937ac86"}) (async) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000000c0)={0x1c, 0x0, &(0x7f0000000040)=[@register_looper, @increfs={0x40046304, 0x2}, @request_death={0x400c630e, 0x1}], 0x11, 0x0, &(0x7f0000000080)="60c37cc47bf6870fe811aea5de5937ac86"}) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:56 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x500}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:56 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x700, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:56 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x810000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:56 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x600}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/hid_apple', 0x199000, 0x46) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000000c0)={0x1c, 0x0, &(0x7f0000000040)=[@register_looper, @increfs={0x40046304, 0x2}, @request_death={0x400c630e, 0x1}], 0x11, 0x0, &(0x7f0000000080)="60c37cc47bf6870fe811aea5de5937ac86"}) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/hid_apple', 0x199000, 0x46) (async) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000000c0)={0x1c, 0x0, &(0x7f0000000040)=[@register_looper, @increfs={0x40046304, 0x2}, @request_death={0x400c630e, 0x1}], 0x11, 0x0, &(0x7f0000000080)="60c37cc47bf6870fe811aea5de5937ac86"}) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:47:56 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) setsockopt$packet_int(r3, 0x107, 0xb, &(0x7f0000000100)=0xc7, 0x4) 08:47:56 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x10000, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:56 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x810, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) r2 = accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14, 0x800) socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/bridge', 0x4000, 0x11) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), r3) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x42000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x14, r4, 0x800, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x8010) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:56 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x4000000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) (async) r2 = accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14, 0x800) socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/bridge', 0x4000, 0x11) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), r3) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x42000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x14, r4, 0x800, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x8010) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:56 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x810}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket(0x2a, 0x0, 0x0) r2 = accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14, 0x800) (async, rerun: 64) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/bridge', 0x4000, 0x11) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), r3) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x42000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x14, r4, 0x800, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x8010) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r1) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r3, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x44001}, 0x4044081) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r1) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r3, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x44001}, 0x4044081) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r1) (async) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r1) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r3, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x44001}, 0x4044081) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:56 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/60, 0x3c, 0x2, 0x0, 0x0) 08:47:56 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x1008, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 08:47:56 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x1008}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:56 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x47ee000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:56 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) setsockopt$packet_int(r3, 0x107, 0xb, &(0x7f0000000100)=0xc7, 0x4) 08:47:56 executing program 2: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/60, 0x3c, 0x2, 0x0, 0x0) 08:47:56 executing program 3: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 08:47:56 executing program 0: socket$packet(0x11, 0x2, 0x300) 08:47:56 executing program 0: socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) (async) 08:47:56 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x4000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:56 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x4000, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:56 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x8700000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:56 executing program 0: socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) (async) 08:47:56 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14, 0x80000) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'pim6reg1\x00', 0x200}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000540)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x28, r4, 0x711, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x28}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x638f}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x20001000}, 0x41) 08:47:56 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0xffff000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:56 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x8700, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:56 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x47ee}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:56 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/60, 0x3c, 0x2, 0x0, 0x0) 08:47:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 32) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 08:47:56 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14, 0x80000) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'pim6reg1\x00', 0x200}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000540)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x28, r4, 0x711, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x28}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x638f}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x20001000}, 0x41) socket$packet(0x11, 0x2, 0x300) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) accept4$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14, 0x80000) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'pim6reg1\x00', 0x200}) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000540)) (async) sendmsg$ETHTOOL_MSG_FEATURES_GET(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x28, r4, 0x711, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x28}}, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x638f}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x20001000}, 0x41) (async) 08:47:56 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:56 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x8700}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:56 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xeffd, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:57 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x3}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:57 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14, 0x80000) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'pim6reg1\x00', 0x200}) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000540)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x28, r4, 0x711, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x28}}, 0x0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x638f}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x20001000}, 0x41) 08:47:57 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0xee47}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:57 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfcfd, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:57 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x10010}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000000)=""/57, 0xfffffffffffffdf0, 0x2, 0x0, 0x0) 08:47:57 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x40002022, 0x0, 0x0) 08:47:57 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfdef, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:57 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x10010}, 0x0) (async) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000000)=""/57, 0xfffffffffffffdf0, 0x2, 0x0, 0x0) 08:47:57 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:57 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x800000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:57 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x40002022, 0x0, 0x0) 08:47:57 executing program 2: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x40002022, 0x0, 0x0) 08:47:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:47:57 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfdfc, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:57 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x5}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:57 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x1000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:57 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r0) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:57 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfdfe, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:57 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x2000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:57 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r0) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:57 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x6}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:57 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x10010}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000000)=""/57, 0xfffffffffffffdf0, 0x2, 0x0, 0x0) 08:47:57 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x3000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:57 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfdff, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:57 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/bus/hdaudio', 0x800, 0x28) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', r1, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000d80)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000d40)={&(0x7f0000000dc0)={0x408, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}, @ETHTOOL_A_EEE_HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}]}, @ETHTOOL_A_EEE_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_EEE_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}]}, @ETHTOOL_A_EEE_MODES_OURS={0x2f8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x50, 0x5, "943104860ac3f804599d3800773bb949b467124833263ba469ec4c2682ac5288627533bddfe69391e01b825a135d9073cbfba04af387fe9799a617d11e1e8aafc9ca8fe2801585e19619d41a"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_VALUE={0x101, 0x4, "3fa08ded08d52494413f69c19e99c993c0b7a17573afea5841e0dac76973c79d50e6bef1cfbf8498129107fefa9d469e7d810450d42ef4769ed4095325407ca560bdd0411f09e34b70cc5c0905e032d0f310bab6a11dff8a1d47c5a37d4344eb096a53e4c8def7ca03e48a4b3ad2a737dd02fc91ecb830a6e75820d3fd975307d3154b622f01137ea32912a9ab462ff89688fc9366ee02697e8d1d0307950e190e322f7c00ab50a0e363ba97639b5f22972060a0b3a0a3980e4b00467e7fddaa04e4ba600f2795fc7986869583d95881d3cb7182d9a4a539d3b8620673409535b48fabb395f6e7fafa47344c440a42ca118197e7d9bf00160d95a1461b"}, @ETHTOOL_A_BITSET_MASK={0x8f, 0x5, "63abd9cb775508dd01b83089f2870aada47c56a6f7cec3f947a171766aaf6bd6254ac9579761e8ab8213dd97d199706e72c3e15a8d5954a6ecf704cd28c4a3aac027fd890200103465f8f718c5be8c4f137f721bf33559b2ef33d2a07b212c8a6550a703a29fa52ddcab3cf640090c7ec607f294d2ed663243773d45743008dc3e02dfa6ce6f693ce46e51"}, @ETHTOOL_A_BITSET_MASK={0xbf, 0x5, "746656c240a38755503a467c97f129d490d34977658fd4b9465b267e7432d0a76eb704e6ef421c3e4f4a30fe480f317398e1723d6fa48396508d1b324d51cbcff5f3819a5c9e58feb32a4fa4bf47f0d696e2a9d26bac55ab2cd80872b1c7cf0d28cdc69318a4d0aec40fb9fa16d76be7012653311a949f643e2037239be6bbc61cf58d328a9d3b043c5d99763eae8d59f704b91b2b8ca2e0da335192ec097f33b5be945338abdc3380ab763ee96b8f8dfc72aa241d3cd5bc71d99a"}, @ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_BITS={0x40, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'macvlan0\x00'}]}]}]}]}, 0x408}, 0x1, 0x0, 0x0, 0x20008010}, 0x4000) write$cgroup_pid(r0, &(0x7f0000000140)=0xffffffffffffffff, 0x12) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r6 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), r6) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendto$packet(r0, &(0x7f00000006c0)="0143d454a53f72ebb9583be70e72b3f0539ce2c97136db3aa561dba2fffa5fef2069fd349bbaf1efcbd9d678711dd38839271a6850b9a8a24f995f9e0ae9bf5345f07cc5149de9959aa58e3bc963c3e493c90d9811c6a427593e9e907aab236a9255af2d3e9afa742db829486509527a804d7397e72d911ec2fcf883e0184f66c242d6d990222c", 0x87, 0x20008814, &(0x7f0000000780)={0x11, 0x19, r5, 0x1, 0x9, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x32}}, 0x14) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000200)={0x268, r7, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x268}, 0x1, 0x0, 0x0, 0x200000d0}, 0x30004001) r12 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/vmstat\x00', 0x0, 0x0) write$qrtrtun(r12, &(0x7f0000000680)="3e0c610893a8f8574de4373d1256fa8bf3aa4a6bb2308161bb30e86888392e7e86e857bb412914e3ccffa3facded888625", 0x31) r13 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r13, &(0x7f00000000c0)='memory.oom.group\x00', 0x2, 0x0) recvfrom$packet(r4, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, r7, 0x0, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xc1}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x1f}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4080}, 0x440c0) 08:47:57 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/bus/hdaudio', 0x800, 0x28) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', r1, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000d80)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000d40)={&(0x7f0000000dc0)={0x408, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}, @ETHTOOL_A_EEE_HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}]}, @ETHTOOL_A_EEE_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_EEE_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}]}, @ETHTOOL_A_EEE_MODES_OURS={0x2f8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x50, 0x5, "943104860ac3f804599d3800773bb949b467124833263ba469ec4c2682ac5288627533bddfe69391e01b825a135d9073cbfba04af387fe9799a617d11e1e8aafc9ca8fe2801585e19619d41a"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_VALUE={0x101, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0x8f, 0x5, "63abd9cb775508dd01b83089f2870aada47c56a6f7cec3f947a171766aaf6bd6254ac9579761e8ab8213dd97d199706e72c3e15a8d5954a6ecf704cd28c4a3aac027fd890200103465f8f718c5be8c4f137f721bf33559b2ef33d2a07b212c8a6550a703a29fa52ddcab3cf640090c7ec607f294d2ed663243773d45743008dc3e02dfa6ce6f693ce46e51"}, @ETHTOOL_A_BITSET_MASK={0xbf, 0x5, "746656c240a38755503a467c97f129d490d34977658fd4b9465b267e7432d0a76eb704e6ef421c3e4f4a30fe480f317398e1723d6fa48396508d1b324d51cbcff5f3819a5c9e58feb32a4fa4bf47f0d696e2a9d26bac55ab2cd80872b1c7cf0d28cdc69318a4d0aec40fb9fa16d76be7012653311a949f643e2037239be6bbc61cf58d328a9d3b043c5d99763eae8d59f704b91b2b8ca2e0da335192ec097f33b5be945338abdc3380ab763ee96b8f8dfc72aa241d3cd5bc71d99a"}, @ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_BITS={0x40, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'macvlan0\x00'}]}]}]}]}, 0x408}, 0x1, 0x0, 0x0, 0x20008010}, 0x4000) (async) write$cgroup_pid(r0, &(0x7f0000000140)=0xffffffffffffffff, 0x12) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) r6 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), r6) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendto$packet(r0, &(0x7f00000006c0)="0143d454a53f72ebb9583be70e72b3f0539ce2c97136db3aa561dba2fffa5fef2069fd349bbaf1efcbd9d678711dd38839271a6850b9a8a24f995f9e0ae9bf5345f07cc5149de9959aa58e3bc963c3e493c90d9811c6a427593e9e907aab236a9255af2d3e9afa742db829486509527a804d7397e72d911ec2fcf883e0184f66c242d6d990222c", 0x87, 0x20008814, &(0x7f0000000780)={0x11, 0x19, r5, 0x1, 0x9, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x32}}, 0x14) (async) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000200)={0x268, r7, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x268}, 0x1, 0x0, 0x0, 0x200000d0}, 0x30004001) (async) r12 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/vmstat\x00', 0x0, 0x0) write$qrtrtun(r12, &(0x7f0000000680)="3e0c610893a8f8574de4373d1256fa8bf3aa4a6bb2308161bb30e86888392e7e86e857bb412914e3ccffa3facded888625", 0x31) r13 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r13, &(0x7f00000000c0)='memory.oom.group\x00', 0x2, 0x0) (async) recvfrom$packet(r4, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, r7, 0x0, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xc1}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x1f}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4080}, 0x440c0) 08:47:57 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/bus/hdaudio', 0x800, 0x28) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/bus/hdaudio', 0x800, 0x28) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', r1, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000d80)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000d40)={&(0x7f0000000dc0)={0x408, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}, @ETHTOOL_A_EEE_HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}]}, @ETHTOOL_A_EEE_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_EEE_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}]}, @ETHTOOL_A_EEE_MODES_OURS={0x2f8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x50, 0x5, "943104860ac3f804599d3800773bb949b467124833263ba469ec4c2682ac5288627533bddfe69391e01b825a135d9073cbfba04af387fe9799a617d11e1e8aafc9ca8fe2801585e19619d41a"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_VALUE={0x101, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0x8f, 0x5, "63abd9cb775508dd01b83089f2870aada47c56a6f7cec3f947a171766aaf6bd6254ac9579761e8ab8213dd97d199706e72c3e15a8d5954a6ecf704cd28c4a3aac027fd890200103465f8f718c5be8c4f137f721bf33559b2ef33d2a07b212c8a6550a703a29fa52ddcab3cf640090c7ec607f294d2ed663243773d45743008dc3e02dfa6ce6f693ce46e51"}, @ETHTOOL_A_BITSET_MASK={0xbf, 0x5, "746656c240a38755503a467c97f129d490d34977658fd4b9465b267e7432d0a76eb704e6ef421c3e4f4a30fe480f317398e1723d6fa48396508d1b324d51cbcff5f3819a5c9e58feb32a4fa4bf47f0d696e2a9d26bac55ab2cd80872b1c7cf0d28cdc69318a4d0aec40fb9fa16d76be7012653311a949f643e2037239be6bbc61cf58d328a9d3b043c5d99763eae8d59f704b91b2b8ca2e0da335192ec097f33b5be945338abdc3380ab763ee96b8f8dfc72aa241d3cd5bc71d99a"}, @ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_BITS={0x40, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'macvlan0\x00'}]}]}]}]}, 0x408}, 0x1, 0x0, 0x0, 0x20008010}, 0x4000) write$cgroup_pid(r0, &(0x7f0000000140)=0xffffffffffffffff, 0x12) socket$packet(0x11, 0x3, 0x300) (async) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) socket(0x2a, 0x0, 0x0) (async) r6 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), r6) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendto$packet(r0, &(0x7f00000006c0)="0143d454a53f72ebb9583be70e72b3f0539ce2c97136db3aa561dba2fffa5fef2069fd349bbaf1efcbd9d678711dd38839271a6850b9a8a24f995f9e0ae9bf5345f07cc5149de9959aa58e3bc963c3e493c90d9811c6a427593e9e907aab236a9255af2d3e9afa742db829486509527a804d7397e72d911ec2fcf883e0184f66c242d6d990222c", 0x87, 0x20008814, &(0x7f0000000780)={0x11, 0x19, r5, 0x1, 0x9, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x32}}, 0x14) (async) sendto$packet(r0, &(0x7f00000006c0)="0143d454a53f72ebb9583be70e72b3f0539ce2c97136db3aa561dba2fffa5fef2069fd349bbaf1efcbd9d678711dd38839271a6850b9a8a24f995f9e0ae9bf5345f07cc5149de9959aa58e3bc963c3e493c90d9811c6a427593e9e907aab236a9255af2d3e9afa742db829486509527a804d7397e72d911ec2fcf883e0184f66c242d6d990222c", 0x87, 0x20008814, &(0x7f0000000780)={0x11, 0x19, r5, 0x1, 0x9, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x32}}, 0x14) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000200)={0x268, r7, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x268}, 0x1, 0x0, 0x0, 0x200000d0}, 0x30004001) r12 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/vmstat\x00', 0x0, 0x0) write$qrtrtun(r12, &(0x7f0000000680)="3e0c610893a8f8574de4373d1256fa8bf3aa4a6bb2308161bb30e86888392e7e86e857bb412914e3ccffa3facded888625", 0x31) (async) write$qrtrtun(r12, &(0x7f0000000680)="3e0c610893a8f8574de4373d1256fa8bf3aa4a6bb2308161bb30e86888392e7e86e857bb412914e3ccffa3facded888625", 0x31) r13 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r13, &(0x7f00000000c0)='memory.oom.group\x00', 0x2, 0x0) (async) openat$cgroup_int(r13, &(0x7f00000000c0)='memory.oom.group\x00', 0x2, 0x0) recvfrom$packet(r4, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r4, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, r7, 0x0, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x1}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xc1}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x1f}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4080}, 0x440c0) 08:47:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x40010062, 0x0, 0x0) 08:47:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x40010062, 0x0, 0x0) 08:47:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x40010062, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x40010062, 0x0, 0x0) (async) 08:47:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) connect$packet(r1, &(0x7f0000000000)={0x11, 0x11, r3, 0x1, 0x9, 0x6, @local}, 0x14) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:58 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r0) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:58 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x87}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:58 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfe00, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:58 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x4000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:58 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x6000}, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r1, &(0x7f0000000040)=""/55, 0x37, 0x10002, 0x0, 0x0) 08:47:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) connect$packet(r1, &(0x7f0000000000)={0x11, 0x11, r3, 0x1, 0x9, 0x6, @local}, 0x14) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:58 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x6000}, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r1, &(0x7f0000000040)=""/55, 0x37, 0x10002, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x6000}, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r1, &(0x7f0000000040)=""/55, 0x37, 0x10002, 0x0, 0x0) (async) 08:47:58 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x6000}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r1, &(0x7f0000000040)=""/55, 0x37, 0x10002, 0x0, 0x0) (async) recvfrom$packet(r1, &(0x7f0000000040)=""/55, 0x37, 0x10002, 0x0, 0x0) 08:47:58 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:58 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x300}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:58 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfefd, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:58 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x5000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:58 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:58 executing program 2: syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) r0 = socket$packet(0x11, 0x2, 0x300) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0xc06ef1f9135907a3, 0x0, 0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x4, 0x800, 0x1}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) getsockname$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r5, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000300)={'batadv_slave_1\x00', 0x0}) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000340)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f00000005c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000580)={&(0x7f0000000380)={0x1cc, r3, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x2c004001}, 0x8000) recvfrom$packet(r0, &(0x7f0000000080)=""/59, 0x3b, 0x40013003, 0x0, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6, 0x7, 0x6c9d, 0x9ca, 0x3, 0x1f, 0x1f}, 0x1c) 08:47:58 executing program 2: syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) r0 = socket$packet(0x11, 0x2, 0x300) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0xc06ef1f9135907a3, 0x0, 0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x4, 0x800, 0x1}) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) (async) getsockname$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r5, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000300)={'batadv_slave_1\x00', 0x0}) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000340)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f00000005c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000580)={&(0x7f0000000380)={0x1cc, r3, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x2c004001}, 0x8000) (async) recvfrom$packet(r0, &(0x7f0000000080)=""/59, 0x3b, 0x40013003, 0x0, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6, 0x7, 0x6c9d, 0x9ca, 0x3, 0x1f, 0x1f}, 0x1c) 08:47:58 executing program 2: syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) (async) r0 = socket$packet(0x11, 0x2, 0x300) (async, rerun: 64) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0xc06ef1f9135907a3, 0x0, 0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x4, 0x800, 0x1}) (rerun: 64) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) getsockname$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) (rerun: 32) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r5, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000300)={'batadv_slave_1\x00', 0x0}) (rerun: 64) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000340)={'batadv_slave_1\x00', 0x0}) (rerun: 32) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f00000005c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000580)={&(0x7f0000000380)={0x1cc, r3, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x2c004001}, 0x8000) (async) recvfrom$packet(r0, &(0x7f0000000080)=""/59, 0x3b, 0x40013003, 0x0, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6, 0x7, 0x6c9d, 0x9ca, 0x3, 0x1f, 0x1f}, 0x1c) 08:47:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/em28xx_rc', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_int(r3, &(0x7f00000000c0)='memory.swap.max\x00', 0x2, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000140)=r2) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x40000002, 0x0, 0x0) 08:47:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) connect$packet(r1, &(0x7f0000000000)={0x11, 0x11, r3, 0x1, 0x9, 0x6, @local}, 0x14) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) connect$packet(r1, &(0x7f0000000000)={0x11, 0x11, r3, 0x1, 0x9, 0x6, @local}, 0x14) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:47:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/em28xx_rc', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_int(r3, &(0x7f00000000c0)='memory.swap.max\x00', 0x2, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000140)=r2) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x40000002, 0x0, 0x0) 08:47:58 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x500}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:58 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfffd, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:58 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x6000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/em28xx_rc', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_int(r3, &(0x7f00000000c0)='memory.swap.max\x00', 0x2, 0x0) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x400000, 0x0) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000140)=r2) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x40000002, 0x0, 0x0) 08:47:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r2, 0x107, 0xd, &(0x7f00000000c0)="9b9fe1059ccb4e874eb0863f0a9c2846da254849dbe428d612626f980a173de24544c3a40664c8279276ed24448d35372f65e30c8c866b6bb2a548a41b27c60409bc9c251325bb68e3e2a382bf6073914fabf25835e3f2c207a458a9a855f87c88b72b1ed1bf98f0522b0ffcd6706132b1c45f55cf22d71d7334ad680945c63f8c7a3b10fff75ab746139a", 0x8b) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x4, 0x6}, 0x4) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:58 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x20}, 'vlan0\x00'}}) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:58 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x600}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:58 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x8100000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:58 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfeffff, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:58 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x810}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x20}, 'vlan0\x00'}}) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14) (async) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14) socket$packet(0x11, 0x3, 0x300) (async) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r2, 0x107, 0xd, &(0x7f00000000c0)="9b9fe1059ccb4e874eb0863f0a9c2846da254849dbe428d612626f980a173de24544c3a40664c8279276ed24448d35372f65e30c8c866b6bb2a548a41b27c60409bc9c251325bb68e3e2a382bf6073914fabf25835e3f2c207a458a9a855f87c88b72b1ed1bf98f0522b0ffcd6706132b1c45f55cf22d71d7334ad680945c63f8c7a3b10fff75ab746139a", 0x8b) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x4, 0x6}, 0x4) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:58 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x1000000, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:58 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x40000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:58 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x1008}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r2, 0x107, 0xd, &(0x7f00000000c0)="9b9fe1059ccb4e874eb0863f0a9c2846da254849dbe428d612626f980a173de24544c3a40664c8279276ed24448d35372f65e30c8c866b6bb2a548a41b27c60409bc9c251325bb68e3e2a382bf6073914fabf25835e3f2c207a458a9a855f87c88b72b1ed1bf98f0522b0ffcd6706132b1c45f55cf22d71d7334ad680945c63f8c7a3b10fff75ab746139a", 0x8b) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x4, 0x6}, 0x4) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:58 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x47ee0000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:58 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x2000000, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:58 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x4000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x20}, 'vlan0\x00'}}) (async) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x20}, 'vlan0\x00'}}) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:58 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r4, 0x107, 0x16, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x3f, 0x2}, {0x0, 0xe0, 0x1, 0x8}]}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendto$packet(r1, &(0x7f0000000080)="7d4a6427871dd20bc0f422856468257ff2f93058ac46f6ab619f1876d019a9625eda07014ec4650c7154", 0x2a, 0xc010, &(0x7f00000000c0)={0x11, 0xf6, r3, 0x1, 0x3, 0x6, @multicast}, 0x14) recvfrom$packet(r0, &(0x7f0000000040)=""/55, 0x37, 0x2, 0x0, 0x0) 08:47:58 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x3000000, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:58 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x87000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:58 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x47ee}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:58 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x4000000, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:58 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0xffff0000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:59 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x8700}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:59 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x5000000, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:59 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x80000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:59 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0xee47}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:59 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r4, 0x107, 0x16, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x3f, 0x2}, {0x0, 0xe0, 0x1, 0x8}]}, 0x10) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) sendto$packet(r1, &(0x7f0000000080)="7d4a6427871dd20bc0f422856468257ff2f93058ac46f6ab619f1876d019a9625eda07014ec4650c7154", 0x2a, 0xc010, &(0x7f00000000c0)={0x11, 0xf6, r3, 0x1, 0x3, 0x6, @multicast}, 0x14) (async) recvfrom$packet(r0, &(0x7f0000000040)=""/55, 0x37, 0x2, 0x0, 0x0) 08:47:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/shm\x00', 0x0, 0x0) sendto$packet(r1, &(0x7f0000000100)="cd3a3d37a6d3ea59cfffe115b8e08c50f0f43699172bc63e6eef1cd0c78c2f80386bbc2e70968550a63fbfec77b62e5447c4c457204ed4a20f831488eb2580e994e746ac9cc6f910616b31a63457e8185bb9196eff092ba6c53ae829397dc04c194ee047f25b8a66869781a93742f294282add5fb0e024bd073f6af39a1dcc5be5e32bd8434a5d65ccf0bb0cf09bbd50c26d9cd9d84c11a10423af1f177a2af7184ea9488eb6f3219a30b4a5258f7c9fdc39", 0xb2, 0x4000804, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/sr9800', 0x14d8f73bb4e54292, 0x30) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:59 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x6000000, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:59 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x100000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:59 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x800000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:59 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x7000000, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:59 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x1000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:59 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x200000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:59 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x8000000, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:59 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:59 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r4, 0x107, 0x16, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x3f, 0x2}, {0x0, 0xe0, 0x1, 0x8}]}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendto$packet(r1, &(0x7f0000000080)="7d4a6427871dd20bc0f422856468257ff2f93058ac46f6ab619f1876d019a9625eda07014ec4650c7154", 0x2a, 0xc010, &(0x7f00000000c0)={0x11, 0xf6, r3, 0x1, 0x3, 0x6, @multicast}, 0x14) (async) sendto$packet(r1, &(0x7f0000000080)="7d4a6427871dd20bc0f422856468257ff2f93058ac46f6ab619f1876d019a9625eda07014ec4650c7154", 0x2a, 0xc010, &(0x7f00000000c0)={0x11, 0xf6, r3, 0x1, 0x3, 0x6, @multicast}, 0x14) recvfrom$packet(r0, &(0x7f0000000040)=""/55, 0x37, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000040)=""/55, 0x37, 0x2, 0x0, 0x0) 08:47:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/shm\x00', 0x0, 0x0) sendto$packet(r1, &(0x7f0000000100)="cd3a3d37a6d3ea59cfffe115b8e08c50f0f43699172bc63e6eef1cd0c78c2f80386bbc2e70968550a63fbfec77b62e5447c4c457204ed4a20f831488eb2580e994e746ac9cc6f910616b31a63457e8185bb9196eff092ba6c53ae829397dc04c194ee047f25b8a66869781a93742f294282add5fb0e024bd073f6af39a1dcc5be5e32bd8434a5d65ccf0bb0cf09bbd50c26d9cd9d84c11a10423af1f177a2af7184ea9488eb6f3219a30b4a5258f7c9fdc39", 0xb2, 0x4000804, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/sr9800', 0x14d8f73bb4e54292, 0x30) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:59 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x2000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:59 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x8100000, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:59 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x400000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/shm\x00', 0x0, 0x0) sendto$packet(r1, &(0x7f0000000100)="cd3a3d37a6d3ea59cfffe115b8e08c50f0f43699172bc63e6eef1cd0c78c2f80386bbc2e70968550a63fbfec77b62e5447c4c457204ed4a20f831488eb2580e994e746ac9cc6f910616b31a63457e8185bb9196eff092ba6c53ae829397dc04c194ee047f25b8a66869781a93742f294282add5fb0e024bd073f6af39a1dcc5be5e32bd8434a5d65ccf0bb0cf09bbd50c26d9cd9d84c11a10423af1f177a2af7184ea9488eb6f3219a30b4a5258f7c9fdc39", 0xb2, 0x4000804, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/sr9800', 0x14d8f73bb4e54292, 0x30) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) (async) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/shm\x00', 0x0, 0x0) (async) sendto$packet(r1, &(0x7f0000000100)="cd3a3d37a6d3ea59cfffe115b8e08c50f0f43699172bc63e6eef1cd0c78c2f80386bbc2e70968550a63fbfec77b62e5447c4c457204ed4a20f831488eb2580e994e746ac9cc6f910616b31a63457e8185bb9196eff092ba6c53ae829397dc04c194ee047f25b8a66869781a93742f294282add5fb0e024bd073f6af39a1dcc5be5e32bd8434a5d65ccf0bb0cf09bbd50c26d9cd9d84c11a10423af1f177a2af7184ea9488eb6f3219a30b4a5258f7c9fdc39", 0xb2, 0x4000804, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/sr9800', 0x14d8f73bb4e54292, 0x30) (async) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:47:59 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req={0x6, 0x1ff, 0x10000, 0xfffffffa}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x11, r2, 0x1, 0x2}, 0x14) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:59 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x40000000, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:59 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x500000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:59 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x3000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0xf, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r4, 0x10, 0x70bd29, 0x25dfdbff, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x4ab8}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x36}]}, 0x2c}}, 0x40) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:59 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000280)) connect$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x19, 0x6, @random="a3f64f8474f9"}, 0x14) sendto$packet(r0, &(0x7f0000000080)="c0f559b24662abfa14d35fd0c675a4d26f46a825deb65e676c8b87176d85069943d9cd3cbc09df266b93d95a6a895045c4edd461efa2fd32ac46d8b98e35e64dd28dd928177b476cf333b24761d06b2a3758e166b5ac9e", 0x57, 0xc0, &(0x7f0000000100)={0x11, 0x6, 0x0, 0x1, 0x40, 0x6, @broadcast}, 0x14) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8000}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x4004}, 0x40010) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000002c0)={0x0, 0x1, 0x6, @local}, 0x10) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000040)=0x2, 0x4) 08:47:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0xf, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r4, 0x10, 0x70bd29, 0x25dfdbff, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x4ab8}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x36}]}, 0x2c}}, 0x40) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0xf, 0x0, 0x0) (async) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) (async) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r4, 0x10, 0x70bd29, 0x25dfdbff, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x4ab8}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x36}]}, 0x2c}}, 0x40) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:47:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0xf, 0x0, 0x0) (async) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r4, 0x10, 0x70bd29, 0x25dfdbff, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x4ab8}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x36}]}, 0x2c}}, 0x40) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:47:59 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x600000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:47:59 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x87000000, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:47:59 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x4000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:47:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, 0x0, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x4044895) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/kcsan', 0x2843, 0x14a) openat$cgroup_int(r3, &(0x7f0000002540)='net_cls.classid\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:00 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req={0x6, 0x1ff, 0x10000, 0xfffffffa}, 0x10) socket$packet(0x11, 0x2, 0x300) (async) r1 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x11, r2, 0x1, 0x2}, 0x14) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:00 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000280)) connect$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x19, 0x6, @random="a3f64f8474f9"}, 0x14) (async) sendto$packet(r0, &(0x7f0000000080)="c0f559b24662abfa14d35fd0c675a4d26f46a825deb65e676c8b87176d85069943d9cd3cbc09df266b93d95a6a895045c4edd461efa2fd32ac46d8b98e35e64dd28dd928177b476cf333b24761d06b2a3758e166b5ac9e", 0x57, 0xc0, &(0x7f0000000100)={0x11, 0x6, 0x0, 0x1, 0x40, 0x6, @broadcast}, 0x14) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8000}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x4004}, 0x40010) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000002c0)={0x0, 0x1, 0x6, @local}, 0x10) (async) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000040)=0x2, 0x4) 08:48:00 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xeffdffff, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:00 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x810000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:00 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x5000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, 0x0, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x4044895) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/kcsan', 0x2843, 0x14a) openat$cgroup_int(r3, &(0x7f0000002540)='net_cls.classid\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:00 executing program 0: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000280)) connect$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x19, 0x6, @random="a3f64f8474f9"}, 0x14) sendto$packet(r0, &(0x7f0000000080)="c0f559b24662abfa14d35fd0c675a4d26f46a825deb65e676c8b87176d85069943d9cd3cbc09df266b93d95a6a895045c4edd461efa2fd32ac46d8b98e35e64dd28dd928177b476cf333b24761d06b2a3758e166b5ac9e", 0x57, 0xc0, &(0x7f0000000100)={0x11, 0x6, 0x0, 0x1, 0x40, 0x6, @broadcast}, 0x14) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8000}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x4004}, 0x40010) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000002c0)={0x0, 0x1, 0x6, @local}, 0x10) (async) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000002c0)={0x0, 0x1, 0x6, @local}, 0x10) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000040)=0x2, 0x4) 08:48:00 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:00 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x4000000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:00 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfcfdffff, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:00 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x6000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:00 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfefdffff, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:01 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x47ee000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:01 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x8100000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:01 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, 0x0, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x4044895) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/kcsan', 0x2843, 0x14a) openat$cgroup_int(r3, &(0x7f0000002540)='net_cls.classid\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:01 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfffdffff, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:01 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req={0x6, 0x1ff, 0x10000, 0xfffffffa}, 0x10) (async) r1 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x11, r2, 0x1, 0x2}, 0x14) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:01 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:01 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000000)="0cc53f90609698bd979e1e7725ee8250a80d4a3a44505a2f56c01fdc04601bd3cdcc10bd23b57e5f50d48b715c169d6f43e254a2e93168e72923ba99384231900bd6efabbd449e98ae623b90e76da2b88d4ceb778dd13dfa1af20bf431ad73043ee8896258c5cf57f8263f700b296101bc523cc552b9a51a5a7fa94f3669fe02f33fa04e3974e29e9f1f170558bb5720d57186e98ffb7b3e19e71990244f5cfd", 0xa0, r0}, 0x68) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:01 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfffffdef, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:01 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x8700000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:01 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x40000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:01 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfffffdfc, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:01 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x47ee0000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:01 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0xffff000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:01 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfffffdfe, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:01 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x87000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:01 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:02 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:02 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfffffdff, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:02 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0xffff0000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000000)="0cc53f90609698bd979e1e7725ee8250a80d4a3a44505a2f56c01fdc04601bd3cdcc10bd23b57e5f50d48b715c169d6f43e254a2e93168e72923ba99384231900bd6efabbd449e98ae623b90e76da2b88d4ceb778dd13dfa1af20bf431ad73043ee8896258c5cf57f8263f700b296101bc523cc552b9a51a5a7fa94f3669fe02f33fa04e3974e29e9f1f170558bb5720d57186e98ffb7b3e19e71990244f5cfd", 0xa0, r0}, 0x68) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:02 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:02 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) recvfrom$packet(r1, &(0x7f0000000200)=""/87, 0x57, 0x10123, &(0x7f0000000140)={0x11, 0x3, r2, 0x1, 0x6, 0x6, @local}, 0x14) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5}, 0x48) getsockname$packet(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:02 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000000)="0cc53f90609698bd979e1e7725ee8250a80d4a3a44505a2f56c01fdc04601bd3cdcc10bd23b57e5f50d48b715c169d6f43e254a2e93168e72923ba99384231900bd6efabbd449e98ae623b90e76da2b88d4ceb778dd13dfa1af20bf431ad73043ee8896258c5cf57f8263f700b296101bc523cc552b9a51a5a7fa94f3669fe02f33fa04e3974e29e9f1f170558bb5720d57186e98ffb7b3e19e71990244f5cfd", 0xa0, r0}, 0x68) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:02 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xfffffe00, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:02 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x80000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:02 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x5}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0xf5, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000040)=0x10001, 0x4) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000080)=""/137, &(0x7f0000000140)=0x89) 08:48:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x31c, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4004090) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000000)=0x6, 0x12) 08:48:02 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0xffffffff, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:02 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x100000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0xf5, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000040)=0x10001, 0x4) (async) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000040)=0x10001, 0x4) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000080)=""/137, &(0x7f0000000140)=0x89) 08:48:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0xf5, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) (async) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000040)=0x10001, 0x4) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000080)=""/137, &(0x7f0000000140)=0x89) 08:48:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r2) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r5, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r8, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getpeername$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xb8, r4, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x50}, 0x60) 08:48:02 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) recvfrom$packet(r1, &(0x7f0000000200)=""/87, 0x57, 0x10123, &(0x7f0000000140)={0x11, 0x3, r2, 0x1, 0x6, 0x6, @local}, 0x14) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5}, 0x48) getsockname$packet(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x14) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:02 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x6}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:02 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x200000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:02 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket(0x2a, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (rerun: 32) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r2) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r5, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r8, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getpeername$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xb8, r4, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x50}, 0x60) 08:48:02 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x87}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x31c, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4004090) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000000)=0x6, 0x12) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x31c, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4004090) (async) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) write$cgroup_int(r2, &(0x7f0000000000)=0x6, 0x12) (async) 08:48:02 executing program 3: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r5, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r8, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getpeername$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xb8, r4, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x50}, 0x60) (async) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xb8, r4, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x50}, 0x60) 08:48:02 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) recvfrom$packet(r1, &(0x7f0000000200)=""/87, 0x57, 0x10123, &(0x7f0000000140)={0x11, 0x3, r2, 0x1, 0x6, 0x6, @local}, 0x14) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5}, 0x48) (async) getsockname$packet(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:02 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:02 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:02 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000040)=""/55, 0xc, 0x40000042, 0x0, 0x4a) 08:48:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x31c, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4004090) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000000)=0x6, 0x12) 08:48:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000040)=""/55, 0xc, 0x40000042, 0x0, 0x4a) 08:48:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000040)=""/55, 0xc, 0x40000042, 0x0, 0x4a) 08:48:02 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x3, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:02 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x400000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:02 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB='gre0\x00'/16, @ANYRES32=0x0, @ANYBLOB="002700010000014750005c00680800002990787f000001ac1414bb44184030c797eef49aa6637a666900000004000020230000000400000100000000560723b2ac1414bbac1414aaffffffffac1414bbe00000020a010102ac1414bbac1e0101890b887f0000017f00000100000000000000da77db834b469a028994b40847315e03"]}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xc8, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0xc8}}, 0x814) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r6, 0x1, 0x6, @local}, 0x10) 08:48:03 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x600}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:03 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x4, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:03 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x500000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB='gre0\x00'/16, @ANYRES32=0x0, @ANYBLOB="002700010000014750005c00680800002990787f000001ac1414bb44184030c797eef49aa6637a666900000004000020230000000400000100000000560723b2ac1414bbac1414aaffffffffac1414bbe00000020a010102ac1414bbac1e0101890b887f0000017f00000100000000000000da77db834b469a028994b40847315e03"]}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xc8, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0xc8}}, 0x814) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r6, 0x1, 0x6, @local}, 0x10) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x48) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB='gre0\x00'/16, @ANYRES32=0x0, @ANYBLOB="002700010000014750005c00680800002990787f000001ac1414bb44184030c797eef49aa6637a666900000004000020230000000400000100000000560723b2ac1414bbac1414aaffffffffac1414bbe00000020a010102ac1414bbac1e0101890b887f0000017f00000100000000000000da77db834b469a028994b40847315e03"]}) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xc8, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0xc8}}, 0x814) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r6, 0x1, 0x6, @local}, 0x10) (async) 08:48:03 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), r0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/61, 0x2d, 0x2, 0x0, 0xfffffffffffffdbc) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00@\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000fedbdf25010000000500030002000000050004000100000006000a0004010000"], 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x8894) 08:48:03 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 64) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), r0) (async, rerun: 64) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/61, 0x2d, 0x2, 0x0, 0xfffffffffffffdbc) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00@\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000fedbdf25010000000500030002000000050004000100000006000a0004010000"], 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x8894) 08:48:03 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r0, 0x8, '\x00', r1, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) bind$bt_sco(r2, &(0x7f00000001c0), 0x8) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000004, 0x10, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r8, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r9, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r9, 0x8, '\x00', r10, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r11 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x100010, r6, 0x10000000) syz_io_uring_submit(r5, r11, &(0x7f0000000240)=@IORING_OP_ACCEPT={0xd, 0xb, 0x0, r0, &(0x7f0000000200), 0x0, 0x0, 0x800}) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="98000000", @ANYRES16=0x0, @ANYBLOB="000404000000fddbdf251300000004000180500001801400020076657468305f766972745f776966690008000100", @ANYRES32=0x0, @ANYBLOB="080052740500000000000000c3a210857c910be7000000000000000000000000008cc688d87cd36f23e66918842d4180102617895a86544fb46f21b0408e498d208abe4cf15f54137d34ecfd247c327e0e0000000000006686e2163d4e6ce46b86c01a2cde3b0fffde30044f7a69e55953b10e01000000f03f831c747a9df1c45819428365", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="080003000300000008000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="3000018014000200627269646765300000000000000000000800030002000000080003000200000008000100", @ANYRES32=r10, @ANYBLOB], 0x98}, 0x1, 0x0, 0x0, 0x400c010}, 0x20000084) r12 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), r9) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000300)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000640)={0x2c8, r12, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x118, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_MASK={0xda, 0x5, "b88710948f4af179985192cd4a8d9da8ad09e3804e4ff095a9087cce9d62a767df64a87d4828002486e3f57cd3ea8f6c07b66cb37332b0d59e4ca19c96f67b2839a3c86f2dc329e908471442b4c9668bf7a85471ccc0ffbb7c4834d1b77af438b718093d19df275d1facf1635745cb3469d66a706535df21e6a0539b6653767434ba21b6e2e4af3f071ecd887bb472f9421a64a046c160cbec76fa2fb08cf6ac36e5ed5fdfddcc72c5439b6fbc48cac3c1630ea3c12209d871b43b87a6939b4660dc7490609b644c268c5d2097e0b6126e16a295d18b"}, @ETHTOOL_A_BITSET_VALUE={0x1d, 0x4, "4e08f20110f9616b533f92f5976043943b8ccce3f3a54d0ace"}, @ETHTOOL_A_BITSET_VALUE={0x10, 0x4, "43808890e4872081ce9c300c"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x134, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x3b, 0x5, "73e61cce642d27a73e4789db6a70fa79f83dc20a4256b6a71e6f322b1fbdd7f42af22caf145883c15ea4c76a37ddf2e1c5b6460cee50c0"}, @ETHTOOL_A_BITSET_BITS={0xf4, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8f32}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}]}, {0x4}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'bridge0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9e3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '+-].%\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xef9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb5}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, 'batadv_slave_0\x00'}]}]}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x2c8}, 0x1, 0x0, 0x0, 0x1}, 0x40000) r14 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r14, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:03 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), r0) (async) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/61, 0x2d, 0x2, 0x0, 0xfffffffffffffdbc) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00@\x00', @ANYRES16=r1, @ANYBLOB="000427bd7000fedbdf25010000000500030002000000050004000100000006000a0004010000"], 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x8894) 08:48:03 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/45, 0xffffffffffffffbb, 0x2, 0x0, 0x27) 08:48:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x48) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB='gre0\x00'/16, @ANYRES32=0x0, @ANYBLOB="002700010000014750005c00680800002990787f000001ac1414bb44184030c797eef49aa6637a666900000004000020230000000400000100000000560723b2ac1414bbac1414aaffffffffac1414bbe00000020a010102ac1414bbac1e0101890b887f0000017f00000100000000000000da77db834b469a028994b40847315e03"]}) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) sendmsg$ETHTOOL_MSG_EEE_GET(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xc8, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0xc8}}, 0x814) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r6, 0x1, 0x6, @local}, 0x10) 08:48:03 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x810}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:03 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:03 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x600000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:03 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x1008}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:03 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x6, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:03 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x810000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:03 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/45, 0xffffffffffffffbb, 0x2, 0x0, 0x27) 08:48:03 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x4000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:03 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) (rerun: 32) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r0, 0x8, '\x00', r1, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) bind$bt_sco(r2, &(0x7f00000001c0), 0x8) (async, rerun: 32) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (rerun: 32) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000004, 0x10, 0xffffffffffffffff, 0x0) (async) r6 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) (rerun: 32) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r8, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async, rerun: 64) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (rerun: 64) openat$cgroup_int(r9, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r9, 0x8, '\x00', r10, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r11 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x100010, r6, 0x10000000) syz_io_uring_submit(r5, r11, &(0x7f0000000240)=@IORING_OP_ACCEPT={0xd, 0xb, 0x0, r0, &(0x7f0000000200), 0x0, 0x0, 0x800}) (async) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="98000000", @ANYRES16=0x0, @ANYBLOB="000404000000fddbdf251300000004000180500001801400020076657468305f766972745f776966690008000100", @ANYRES32=0x0, @ANYBLOB="080052740500000000000000c3a210857c910be7000000000000000000000000008cc688d87cd36f23e66918842d4180102617895a86544fb46f21b0408e498d208abe4cf15f54137d34ecfd247c327e0e0000000000006686e2163d4e6ce46b86c01a2cde3b0fffde30044f7a69e55953b10e01000000f03f831c747a9df1c45819428365", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="080003000300000008000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="3000018014000200627269646765300000000000000000000800030002000000080003000200000008000100", @ANYRES32=r10, @ANYBLOB], 0x98}, 0x1, 0x0, 0x0, 0x400c010}, 0x20000084) (async) r12 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), r9) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000300)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000640)={0x2c8, r12, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x118, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_MASK={0xda, 0x5, "b88710948f4af179985192cd4a8d9da8ad09e3804e4ff095a9087cce9d62a767df64a87d4828002486e3f57cd3ea8f6c07b66cb37332b0d59e4ca19c96f67b2839a3c86f2dc329e908471442b4c9668bf7a85471ccc0ffbb7c4834d1b77af438b718093d19df275d1facf1635745cb3469d66a706535df21e6a0539b6653767434ba21b6e2e4af3f071ecd887bb472f9421a64a046c160cbec76fa2fb08cf6ac36e5ed5fdfddcc72c5439b6fbc48cac3c1630ea3c12209d871b43b87a6939b4660dc7490609b644c268c5d2097e0b6126e16a295d18b"}, @ETHTOOL_A_BITSET_VALUE={0x1d, 0x4, "4e08f20110f9616b533f92f5976043943b8ccce3f3a54d0ace"}, @ETHTOOL_A_BITSET_VALUE={0x10, 0x4, "43808890e4872081ce9c300c"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x134, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x3b, 0x5, "73e61cce642d27a73e4789db6a70fa79f83dc20a4256b6a71e6f322b1fbdd7f42af22caf145883c15ea4c76a37ddf2e1c5b6460cee50c0"}, @ETHTOOL_A_BITSET_BITS={0xf4, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8f32}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}]}, {0x4}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'bridge0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9e3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '+-].%\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xef9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb5}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, 'batadv_slave_0\x00'}]}]}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x2c8}, 0x1, 0x0, 0x0, 0x1}, 0x40000) (async) r14 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r14, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:03 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x7, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:03 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x4000000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:03 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/45, 0xffffffffffffffbb, 0x2, 0x0, 0x27) 08:48:03 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x47ee}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00', 0x0}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/mwifiex', 0x14000, 0x142) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) connect$l2tp6(r7, &(0x7f00000007c0)={0xa, 0x0, 0x3ff, @dev={0xfe, 0x80, '\x00', 0x23}, 0x9a69, 0x4}, 0x20) sendmsg$ETHTOOL_MSG_TSINFO_GET(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r4, &(0x7f0000000780)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="442500004378ec5555cd36bff3e074ea65235313ced1a4b4fd81dad5b484eb2dc87bafa04c42d31d8f4b2fe1c04fc10ce12e5c0d8e3b", @ANYRES16=r6, @ANYBLOB="000128bd7000ffdbdf2503000000050003000300000005000300040000000500020001000000050003000000000005000200280000000500020020000000"], 0x44}, 0x1, 0x0, 0x0, 0xc800}, 0x40000) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x0, 0x0, r2, 0x1000, '\x00', r3, r4, 0x5, 0x4, 0x2}, 0x48) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/pcmcia_core', 0x40000, 0x42) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000480)={{r4}, &(0x7f0000000400), &(0x7f0000000440)='%pI4 \x00'}, 0x20) pipe2$watch_queue(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x15, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x6}], &(0x7f0000000240)='syzkaller\x00', 0x5, 0xe0, &(0x7f0000000280)=""/224, 0x40f00, 0x0, '\x00', r3, 0x14, r4, 0x8, &(0x7f0000000380)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x10, 0x3, 0x8}, 0x10, 0x0, r4, 0x9, &(0x7f00000004c0)=[r9], &(0x7f0000000840)=[{0x4, 0x1, 0x1, 0x1}, {0x2, 0x5, 0x7, 0x7}, {0x2, 0x3, 0x6, 0x5}, {0x1, 0x5, 0xa, 0xa}, {0x2, 0x4, 0xc, 0x9}, {0x2, 0x5, 0x9, 0x7}, {0x3, 0x3, 0x10}, {0x3, 0x1, 0xf, 0x4}, {0x5, 0x4, 0x5, 0xb}], 0x10, 0x1f}, 0x90) 08:48:03 executing program 3: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x48) (async) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/mwifiex', 0x14000, 0x142) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/mwifiex', 0x14000, 0x142) socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) connect$l2tp6(r7, &(0x7f00000007c0)={0xa, 0x0, 0x3ff, @dev={0xfe, 0x80, '\x00', 0x23}, 0x9a69, 0x4}, 0x20) (async) connect$l2tp6(r7, &(0x7f00000007c0)={0xa, 0x0, 0x3ff, @dev={0xfe, 0x80, '\x00', 0x23}, 0x9a69, 0x4}, 0x20) sendmsg$ETHTOOL_MSG_TSINFO_GET(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r4, &(0x7f0000000780)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="442500004378ec5555cd36bff3e074ea65235313ced1a4b4fd81dad5b484eb2dc87bafa04c42d31d8f4b2fe1c04fc10ce12e5c0d8e3b", @ANYRES16=r6, @ANYBLOB="000128bd7000ffdbdf2503000000050003000300000005000300040000000500020001000000050003000000000005000200280000000500020020000000"], 0x44}, 0x1, 0x0, 0x0, 0xc800}, 0x40000) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x0, 0x0, r2, 0x1000, '\x00', r3, r4, 0x5, 0x4, 0x2}, 0x48) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/pcmcia_core', 0x40000, 0x42) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000480)={{r4}, &(0x7f0000000400), &(0x7f0000000440)='%pI4 \x00'}, 0x20) pipe2$watch_queue(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x15, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x6}], &(0x7f0000000240)='syzkaller\x00', 0x5, 0xe0, &(0x7f0000000280)=""/224, 0x40f00, 0x0, '\x00', r3, 0x14, r4, 0x8, &(0x7f0000000380)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x10, 0x3, 0x8}, 0x10, 0x0, r4, 0x9, &(0x7f00000004c0)=[r9], &(0x7f0000000840)=[{0x4, 0x1, 0x1, 0x1}, {0x2, 0x5, 0x7, 0x7}, {0x2, 0x3, 0x6, 0x5}, {0x1, 0x5, 0xa, 0xa}, {0x2, 0x4, 0xc, 0x9}, {0x2, 0x5, 0x9, 0x7}, {0x3, 0x3, 0x10}, {0x3, 0x1, 0xf, 0x4}, {0x5, 0x4, 0x5, 0xb}], 0x10, 0x1f}, 0x90) 08:48:03 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:03 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x8700}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:03 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x47ee000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async, rerun: 64) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x48) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00', 0x0}) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/mwifiex', 0x14000, 0x142) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 64) connect$l2tp6(r7, &(0x7f00000007c0)={0xa, 0x0, 0x3ff, @dev={0xfe, 0x80, '\x00', 0x23}, 0x9a69, 0x4}, 0x20) (async, rerun: 64) sendmsg$ETHTOOL_MSG_TSINFO_GET(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r6, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) (async) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r4, &(0x7f0000000780)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="442500004378ec5555cd36bff3e074ea65235313ced1a4b4fd81dad5b484eb2dc87bafa04c42d31d8f4b2fe1c04fc10ce12e5c0d8e3b", @ANYRES16=r6, @ANYBLOB="000128bd7000ffdbdf2503000000050003000300000005000300040000000500020001000000050003000000000005000200280000000500020020000000"], 0x44}, 0x1, 0x0, 0x0, 0xc800}, 0x40000) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x0, 0x0, r2, 0x1000, '\x00', r3, r4, 0x5, 0x4, 0x2}, 0x48) (async) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/pcmcia_core', 0x40000, 0x42) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000480)={{r4}, &(0x7f0000000400), &(0x7f0000000440)='%pI4 \x00'}, 0x20) (async, rerun: 64) pipe2$watch_queue(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x15, 0x9, &(0x7f00000001c0)=@raw=[@map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x6}], &(0x7f0000000240)='syzkaller\x00', 0x5, 0xe0, &(0x7f0000000280)=""/224, 0x40f00, 0x0, '\x00', r3, 0x14, r4, 0x8, &(0x7f0000000380)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x10, 0x3, 0x8}, 0x10, 0x0, r4, 0x9, &(0x7f00000004c0)=[r9], &(0x7f0000000840)=[{0x4, 0x1, 0x1, 0x1}, {0x2, 0x5, 0x7, 0x7}, {0x2, 0x3, 0x6, 0x5}, {0x1, 0x5, 0xa, 0xa}, {0x2, 0x4, 0xc, 0x9}, {0x2, 0x5, 0x9, 0x7}, {0x3, 0x3, 0x10}, {0x3, 0x1, 0xf, 0x4}, {0x5, 0x4, 0x5, 0xb}], 0x10, 0x1f}, 0x90) 08:48:03 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x8700000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:03 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r0, 0x8, '\x00', r1, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) bind$bt_sco(r2, &(0x7f00000001c0), 0x8) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) (async) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000004, 0x10, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x8, '\x00', r8, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r9, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r9, 0x8, '\x00', r10, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r11 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x100010, r6, 0x10000000) syz_io_uring_submit(r5, r11, &(0x7f0000000240)=@IORING_OP_ACCEPT={0xd, 0xb, 0x0, r0, &(0x7f0000000200), 0x0, 0x0, 0x800}) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="98000000", @ANYRES16=0x0, @ANYBLOB="000404000000fddbdf251300000004000180500001801400020076657468305f766972745f776966690008000100", @ANYRES32=0x0, @ANYBLOB="080052740500000000000000c3a210857c910be7000000000000000000000000008cc688d87cd36f23e66918842d4180102617895a86544fb46f21b0408e498d208abe4cf15f54137d34ecfd247c327e0e0000000000006686e2163d4e6ce46b86c01a2cde3b0fffde30044f7a69e55953b10e01000000f03f831c747a9df1c45819428365", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="080003000300000008000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="3000018014000200627269646765300000000000000000000800030002000000080003000200000008000100", @ANYRES32=r10, @ANYBLOB], 0x98}, 0x1, 0x0, 0x0, 0x400c010}, 0x20000084) (async) r12 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), r9) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000300)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000640)={0x2c8, r12, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x118, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_MASK={0xda, 0x5, "b88710948f4af179985192cd4a8d9da8ad09e3804e4ff095a9087cce9d62a767df64a87d4828002486e3f57cd3ea8f6c07b66cb37332b0d59e4ca19c96f67b2839a3c86f2dc329e908471442b4c9668bf7a85471ccc0ffbb7c4834d1b77af438b718093d19df275d1facf1635745cb3469d66a706535df21e6a0539b6653767434ba21b6e2e4af3f071ecd887bb472f9421a64a046c160cbec76fa2fb08cf6ac36e5ed5fdfddcc72c5439b6fbc48cac3c1630ea3c12209d871b43b87a6939b4660dc7490609b644c268c5d2097e0b6126e16a295d18b"}, @ETHTOOL_A_BITSET_VALUE={0x1d, 0x4, "4e08f20110f9616b533f92f5976043943b8ccce3f3a54d0ace"}, @ETHTOOL_A_BITSET_VALUE={0x10, 0x4, "43808890e4872081ce9c300c"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x134, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x3b, 0x5, "73e61cce642d27a73e4789db6a70fa79f83dc20a4256b6a71e6f322b1fbdd7f42af22caf145883c15ea4c76a37ddf2e1c5b6460cee50c0"}, @ETHTOOL_A_BITSET_BITS={0xf4, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8f32}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}]}, {0x4}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'bridge0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9e3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '+-].%\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xef9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb5}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, 'batadv_slave_0\x00'}]}]}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x2c8}, 0x1, 0x0, 0x0, 0x1}, 0x40000) (async) r14 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r14, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:03 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x87, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:03 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0xee47}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:04 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0xffff000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x8) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'virt_wifi0\x00'}) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.write_iops_device\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:04 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0xfe, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:04 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x8c, r1, 0x8, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000802}, 0x10041) 08:48:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x610200, 0x0) ioctl$TUNSETIFINDEX(r0, 0x5451, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000080)=""/133, &(0x7f0000000000)=0x85) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$TUNSETDEBUG(r2, 0x400454c9, &(0x7f0000000240)=0x2) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c000000185e14b4846529526b5b8ed3b9c0cd8099a7886a75193b79062e5ae1cf4ae1847fabe0fed3497d0fefc81c1f5eb8fe3bb365175f79613a981bdd84146def36fe0f719a1590d8301fe929120cdff62246286593488628ed9c02b995ad6219c3bae6c08efecbff887a02fe450ee45cf4ec250866d0a0dbf103d16a0e247b883e6e5c3ce663f9c6e8bc77dc3ccc7873ba60e3d05fea8b00", @ANYRES16=0x0, @ANYBLOB="00032bbd7000ffdbdf250f000000080031000300000005002a000000000008002c00ff0f000008003c00d83b00000800320007000000"], 0x3c}, 0x1, 0x0, 0x0, 0x84}, 0x4010044) 08:48:04 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x800000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:04 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async, rerun: 64) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async, rerun: 64) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x8c, r1, 0x8, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000802}, 0x10041) 08:48:04 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x300, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:04 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:04 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:04 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x500, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:04 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:04 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x8) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'virt_wifi0\x00'}) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.write_iops_device\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:04 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:04 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x600, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:04 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x610200, 0x0) ioctl$TUNSETIFINDEX(r0, 0x5451, 0x0) (async) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000080)=""/133, &(0x7f0000000000)=0x85) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 32) ioctl$TUNSETDEBUG(r2, 0x400454c9, &(0x7f0000000240)=0x2) (async, rerun: 32) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c000000185e14b4846529526b5b8ed3b9c0cd8099a7886a75193b79062e5ae1cf4ae1847fabe0fed3497d0fefc81c1f5eb8fe3bb365175f79613a981bdd84146def36fe0f719a1590d8301fe929120cdff62246286593488628ed9c02b995ad6219c3bae6c08efecbff887a02fe450ee45cf4ec250866d0a0dbf103d16a0e247b883e6e5c3ce663f9c6e8bc77dc3ccc7873ba60e3d05fea8b00", @ANYRES16=0x0, @ANYBLOB="00032bbd7000ffdbdf250f000000080031000300000005002a000000000008002c00ff0f000008003c00d83b00000800320007000000"], 0x3c}, 0x1, 0x0, 0x0, 0x84}, 0x4010044) 08:48:04 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x8c, r1, 0x8, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000802}, 0x10041) 08:48:04 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/52, 0x34, 0x20000000, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/bus/event_source', 0x105000, 0x42) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000380)={0x14, 0x0, &(0x7f00000002c0)=[@increfs_done], 0xca, 0x0, &(0x7f00000003c0)="cd12a37ef7e0f84c5eb91132588b4d74064834985a7bf42a13d274bc2feb782601b2cce4efcd4d5f5579cf5f48c24795431b8cf153b0e0cc5323674b0806337b9cbd52e6064bb87a673be62c8e1d1377f55880d0476ece17c2991fec62dd55198637894217e0da19d12ac51d1159487fbc714f813703b7d9208049a3b88b608cb9a93a8f988fa1217c17e0c87c8f33d4165c24903a51508798b1debeb98837545eaedf09048efe326777454715f4b00000000000000000000000000000b71b600f1219bbec107c8658aa"}) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020029bd7000fedbdf250100000005002d000000000005002f00010000000500330001000000414d5c312ca45997955527058961fab6b40a7c8836bacca3ba3113378510729c5e5138d607d7c756ff5d4a8576de80e81b97696a522c21f451f37758d8ff4e2402841bc30888d5c60c40b3302cc233084fd04c0c6c2ac1f8e53f024c5e1f42cbcff21550e7b33fdf7999632232e939c334f946669e33ca798460ed043cdc6f9dfa9e1d100d2cfd413a9461d0ebb2e780634604dcd85a19e267b1de2e5b784b203d63bf1aab1e0799ac78895734a613c8373891f031d963ca699a49e6973471c86c96d9f92cf63f8f8cb5838ee303abc5"], 0x2c}, 0x1, 0x0, 0x0, 0xc0c4}, 0x8000) 08:48:04 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/52, 0x34, 0x20000000, 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/bus/event_source', 0x105000, 0x42) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000380)={0x14, 0x0, &(0x7f00000002c0)=[@increfs_done], 0xca, 0x0, &(0x7f00000003c0)="cd12a37ef7e0f84c5eb91132588b4d74064834985a7bf42a13d274bc2feb782601b2cce4efcd4d5f5579cf5f48c24795431b8cf153b0e0cc5323674b0806337b9cbd52e6064bb87a673be62c8e1d1377f55880d0476ece17c2991fec62dd55198637894217e0da19d12ac51d1159487fbc714f813703b7d9208049a3b88b608cb9a93a8f988fa1217c17e0c87c8f33d4165c24903a51508798b1debeb98837545eaedf09048efe326777454715f4b00000000000000000000000000000b71b600f1219bbec107c8658aa"}) (async) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020029bd7000fedbdf250100000005002d000000000005002f00010000000500330001000000414d5c312ca45997955527058961fab6b40a7c8836bacca3ba3113378510729c5e5138d607d7c756ff5d4a8576de80e81b97696a522c21f451f37758d8ff4e2402841bc30888d5c60c40b3302cc233084fd04c0c6c2ac1f8e53f024c5e1f42cbcff21550e7b33fdf7999632232e939c334f946669e33ca798460ed043cdc6f9dfa9e1d100d2cfd413a9461d0ebb2e780634604dcd85a19e267b1de2e5b784b203d63bf1aab1e0799ac78895734a613c8373891f031d963ca699a49e6973471c86c96d9f92cf63f8f8cb5838ee303abc5"], 0x2c}, 0x1, 0x0, 0x0, 0xc0c4}, 0x8000) 08:48:04 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/52, 0x34, 0x20000000, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/bus/event_source', 0x105000, 0x42) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000380)={0x14, 0x0, &(0x7f00000002c0)=[@increfs_done], 0xca, 0x0, &(0x7f00000003c0)="cd12a37ef7e0f84c5eb91132588b4d74064834985a7bf42a13d274bc2feb782601b2cce4efcd4d5f5579cf5f48c24795431b8cf153b0e0cc5323674b0806337b9cbd52e6064bb87a673be62c8e1d1377f55880d0476ece17c2991fec62dd55198637894217e0da19d12ac51d1159487fbc714f813703b7d9208049a3b88b608cb9a93a8f988fa1217c17e0c87c8f33d4165c24903a51508798b1debeb98837545eaedf09048efe326777454715f4b00000000000000000000000000000b71b600f1219bbec107c8658aa"}) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020029bd7000fedbdf250100000005002d000000000005002f00010000000500330001000000414d5c312ca45997955527058961fab6b40a7c8836bacca3ba3113378510729c5e5138d607d7c756ff5d4a8576de80e81b97696a522c21f451f37758d8ff4e2402841bc30888d5c60c40b3302cc233084fd04c0c6c2ac1f8e53f024c5e1f42cbcff21550e7b33fdf7999632232e939c334f946669e33ca798460ed043cdc6f9dfa9e1d100d2cfd413a9461d0ebb2e780634604dcd85a19e267b1de2e5b784b203d63bf1aab1e0799ac78895734a613c8373891f031d963ca699a49e6973471c86c96d9f92cf63f8f8cb5838ee303abc5"], 0x2c}, 0x1, 0x0, 0x0, 0xc0c4}, 0x8000) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000000)=""/52, 0x34, 0x20000000, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/bus/event_source', 0x105000, 0x42) (async) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000380)={0x14, 0x0, &(0x7f00000002c0)=[@increfs_done], 0xca, 0x0, &(0x7f00000003c0)="cd12a37ef7e0f84c5eb91132588b4d74064834985a7bf42a13d274bc2feb782601b2cce4efcd4d5f5579cf5f48c24795431b8cf153b0e0cc5323674b0806337b9cbd52e6064bb87a673be62c8e1d1377f55880d0476ece17c2991fec62dd55198637894217e0da19d12ac51d1159487fbc714f813703b7d9208049a3b88b608cb9a93a8f988fa1217c17e0c87c8f33d4165c24903a51508798b1debeb98837545eaedf09048efe326777454715f4b00000000000000000000000000000b71b600f1219bbec107c8658aa"}) (async) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020029bd7000fedbdf250100000005002d000000000005002f00010000000500330001000000414d5c312ca45997955527058961fab6b40a7c8836bacca3ba3113378510729c5e5138d607d7c756ff5d4a8576de80e81b97696a522c21f451f37758d8ff4e2402841bc30888d5c60c40b3302cc233084fd04c0c6c2ac1f8e53f024c5e1f42cbcff21550e7b33fdf7999632232e939c334f946669e33ca798460ed043cdc6f9dfa9e1d100d2cfd413a9461d0ebb2e780634604dcd85a19e267b1de2e5b784b203d63bf1aab1e0799ac78895734a613c8373891f031d963ca699a49e6973471c86c96d9f92cf63f8f8cb5838ee303abc5"], 0x2c}, 0x1, 0x0, 0x0, 0xc0c4}, 0x8000) (async) 08:48:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000040)=""/245, &(0x7f0000000140)=0xf5) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/module/nf_conntrack_ftp', 0x8000, 0x10) accept$packet(r2, 0x0, &(0x7f0000000200)) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2d01) 08:48:04 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x700, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:04 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x8) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 32) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'virt_wifi0\x00'}) (rerun: 32) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.write_iops_device\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:04 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x610200, 0x0) ioctl$TUNSETIFINDEX(r0, 0x5451, 0x0) (async, rerun: 64) r1 = socket$packet(0x11, 0x2, 0x300) (async, rerun: 64) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000080)=""/133, &(0x7f0000000000)=0x85) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$TUNSETDEBUG(r2, 0x400454c9, &(0x7f0000000240)=0x2) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c000000185e14b4846529526b5b8ed3b9c0cd8099a7886a75193b79062e5ae1cf4ae1847fabe0fed3497d0fefc81c1f5eb8fe3bb365175f79613a981bdd84146def36fe0f719a1590d8301fe929120cdff62246286593488628ed9c02b995ad6219c3bae6c08efecbff887a02fe450ee45cf4ec250866d0a0dbf103d16a0e247b883e6e5c3ce663f9c6e8bc77dc3ccc7873ba60e3d05fea8b00", @ANYRES16=0x0, @ANYBLOB="00032bbd7000ffdbdf250f000000080031000300000005002a000000000008002c00ff0f000008003c00d83b00000800320007000000"], 0x3c}, 0x1, 0x0, 0x0, 0x84}, 0x4010044) 08:48:04 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0xfffffffffffffd84) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r1) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, r3, 0x400, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xfff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xffffffff}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4048800}, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r5 = io_uring_setup(0x543, &(0x7f0000000280)={0x0, 0x2, 0x4, 0x3, 0x210}) mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xa, 0x10, r5, 0x8000000) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) connect$packet(r0, &(0x7f0000000000)={0x11, 0x16, r6, 0x1, 0x7, 0x6, @multicast}, 0x14) 08:48:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000040}, 0x20000080) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000040)=""/245, &(0x7f0000000140)=0xf5) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/module/nf_conntrack_ftp', 0x8000, 0x10) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/module/nf_conntrack_ftp', 0x8000, 0x10) accept$packet(r2, 0x0, &(0x7f0000000200)) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2d01) 08:48:04 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x810, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async, rerun: 64) socket(0x2a, 0x0, 0x0) (async, rerun: 64) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000040}, 0x20000080) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:04 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x5000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:04 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x6}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000040}, 0x20000080) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000040)=""/245, &(0x7f0000000140)=0xf5) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/module/nf_conntrack_ftp', 0x8000, 0x10) accept$packet(r2, 0x0, &(0x7f0000000200)) (async) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) (async) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x2d01) 08:48:04 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1008, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:04 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xc449}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40), 0x20000, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xa, 0x10, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000009000000000000000300000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000011a4dd007000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000"], &(0x7f0000000280)='syzkaller\x00', 0x9b25, 0x8e, &(0x7f00000002c0)=""/142, 0x41100, 0x41, '\x00', r1, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x8, 0x5, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000440)=[{0x3, 0x1, 0x1, 0x2}], 0x10, 0x5}, 0x90) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000540)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x3, 0x0, r2, &(0x7f00000001c0)={0x10000000}, r3}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r4, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fbdbdf251100000008003b0000000000080034004ec63c1505003800010000000a000900000000000000000008000600", @ANYRES32=r1, @ANYBLOB="080031000600000008003100010400000500350009000000"], 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x4) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001d80)={&(0x7f0000001c40)={0x134, 0x0, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x800}, 0x58014) r6 = socket(0x6, 0x5, 0x7b66) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r5) getpeername$packet(r5, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000840)=0x14) sendmsg$ETHTOOL_MSG_RINGS_GET(r6, &(0x7f0000000a00)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000880)={0x108, r7, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x61, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r9, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_int(r9, &(0x7f0000000080)='hugetlb.2MB.rsvd.limit_in_bytes\x00', 0x2, 0x0) accept4$packet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0x14, 0x0) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) write$qrtrtun(r10, &(0x7f0000000bc0)="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", 0x1000) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r9, 0x8933, &(0x7f0000000ac0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r11, &(0x7f0000000b80)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x34, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x40}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r12}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x8000) connect$packet(r5, &(0x7f0000000000)={0x11, 0xf6, 0x0, 0x1, 0x42, 0x6, @local}, 0x14) 08:48:05 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0xfffffffffffffd84) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r1) (async) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r1) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, r3, 0x400, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xfff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xffffffff}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4048800}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, r3, 0x400, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xfff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xffffffff}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4048800}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r5 = io_uring_setup(0x543, &(0x7f0000000280)={0x0, 0x2, 0x4, 0x3, 0x210}) mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xa, 0x10, r5, 0x8000000) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) connect$packet(r0, &(0x7f0000000000)={0x11, 0x16, r6, 0x1, 0x7, 0x6, @multicast}, 0x14) 08:48:05 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x6000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:05 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x87}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:05 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x4000, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:05 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xc449}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40), 0x20000, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xa, 0x10, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000009000000000000000300000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000011a4dd007000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000"], &(0x7f0000000280)='syzkaller\x00', 0x9b25, 0x8e, &(0x7f00000002c0)=""/142, 0x41100, 0x41, '\x00', r1, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x8, 0x5, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000440)=[{0x3, 0x1, 0x1, 0x2}], 0x10, 0x5}, 0x90) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000540)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x3, 0x0, r2, &(0x7f00000001c0)={0x10000000}, r3}) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 32) sendmsg$BATADV_CMD_GET_VLAN(r4, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fbdbdf251100000008003b0000000000080034004ec63c1505003800010000000a000900000000000000000008000600", @ANYRES32=r1, @ANYBLOB="080031000600000008003100010400000500350009000000"], 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x4) (async, rerun: 32) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001d80)={&(0x7f0000001c40)={0x134, 0x0, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x800}, 0x58014) (async) r6 = socket(0x6, 0x5, 0x7b66) (async) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r5) (async) getpeername$packet(r5, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000840)=0x14) sendmsg$ETHTOOL_MSG_RINGS_GET(r6, &(0x7f0000000a00)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000880)={0x108, r7, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x61, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) (async) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r9, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_int(r9, &(0x7f0000000080)='hugetlb.2MB.rsvd.limit_in_bytes\x00', 0x2, 0x0) accept4$packet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0x14, 0x0) (async) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) write$qrtrtun(r10, &(0x7f0000000bc0)="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", 0x1000) (async) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r9, 0x8933, &(0x7f0000000ac0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r11, &(0x7f0000000b80)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x34, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x40}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r12}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x8000) (async) connect$packet(r5, &(0x7f0000000000)={0x11, 0xf6, 0x0, 0x1, 0x42, 0x6, @local}, 0x14) 08:48:05 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:05 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xc449}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40), 0x20000, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xa, 0x10, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000009000000000000000300000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000011a4dd007000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000"], &(0x7f0000000280)='syzkaller\x00', 0x9b25, 0x8e, &(0x7f00000002c0)=""/142, 0x41100, 0x41, '\x00', r1, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x1, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x8, 0x5, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000400)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000440)=[{0x3, 0x1, 0x1, 0x2}], 0x10, 0x5}, 0x90) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000540)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x3, 0x0, r2, &(0x7f00000001c0)={0x10000000}, r3}) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$BATADV_CMD_GET_VLAN(r4, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012dbd7000fbdbdf251100000008003b0000000000080034004ec63c1505003800010000000a000900000000000000000008000600", @ANYRES32=r1, @ANYBLOB="080031000600000008003100010400000500350009000000"], 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x4) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000001dc0)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001d80)={&(0x7f0000001c40)={0x134, 0x0, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x800}, 0x58014) r6 = socket(0x6, 0x5, 0x7b66) (async) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r5) getpeername$packet(r5, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000840)=0x14) sendmsg$ETHTOOL_MSG_RINGS_GET(r6, &(0x7f0000000a00)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000880)={0x108, r7, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x61, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r9, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r9, &(0x7f0000000080)='hugetlb.2MB.rsvd.limit_in_bytes\x00', 0x2, 0x0) accept4$packet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0x14, 0x0) (async) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) write$qrtrtun(r10, &(0x7f0000000bc0)="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", 0x1000) (async) r11 = socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r9, 0x8933, &(0x7f0000000ac0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r11, &(0x7f0000000b80)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x34, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x40}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r12}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x8000) (async) connect$packet(r5, &(0x7f0000000000)={0x11, 0xf6, 0x0, 0x1, 0x42, 0x6, @local}, 0x14) 08:48:05 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) io_setup(0x4, &(0x7f0000000400)=0x0) io_cancel(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x2, r0, &(0x7f0000000000), 0x0, 0x2, 0x0, 0x3}, &(0x7f0000000080)) r2 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r2, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 08:48:05 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:05 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0xfffffffffffffd84) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r1) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, r3, 0x400, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xfff}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xffffffff}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4048800}, 0x0) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r5 = io_uring_setup(0x543, &(0x7f0000000280)={0x0, 0x2, 0x4, 0x3, 0x210}) mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xa, 0x10, r5, 0x8000000) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) connect$packet(r0, &(0x7f0000000000)={0x11, 0x16, r6, 0x1, 0x7, 0x6, @multicast}, 0x14) 08:48:05 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:05 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8700, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:05 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x8100000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:05 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:05 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0xeffd, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:05 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x40000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:05 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x600}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:05 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0xfcfd, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:05 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x47ee0000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:05 executing program 0: read$qrtrtun(0xffffffffffffffff, &(0x7f0000000300)=""/227, 0xe3) r0 = socket$packet(0x11, 0x2, 0x300) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000140)="b2f69a9fa653d6adc3788d67832992975531746790477fce7adb45788141d6afb61039f874cb4b0dad13", 0x2a) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/custom0\x00', 0x2, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21010000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x84, 0x0, 0x4, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_EEE_MODES_OURS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_EEE_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x5d04}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}]}, 0x84}, 0x1, 0x0, 0x0, 0x40000}, 0x8084) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000400)="0ad4d130744d6ba73f5a5482e9989ae7cc23fdfe762d3e6caa1b0dc6b60e4bf92d8f587475ce60052b14fbd45ded36b17dc81700c13e272a2e4ceb78438b0d50edc8cb8d120095a7359fea55183580b2ff33e60f15e7f8340b411812798735e13605d177a53c6f297433e4115c7d0c776e2ac91409ccdcd9c29fd1bca3d3e091fd735a0dc5b03292067257ea13951fef927c7f0b53cfcf", 0x97) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) accept$packet(r2, 0x0, &(0x7f0000000200)) 08:48:05 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) io_setup(0x4, &(0x7f0000000400)=0x0) io_cancel(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) (async) io_cancel(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x2, r0, &(0x7f0000000000), 0x0, 0x2, 0x0, 0x3}, &(0x7f0000000080)) (async, rerun: 64) r2 = socket$packet(0x11, 0x2, 0x300) (rerun: 64) recvfrom$packet(r2, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) socket$packet(0x11, 0x3, 0x300) 08:48:05 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x810}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:05 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0xfdef, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:05 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x87000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:05 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4231, 0xffffffffffffffff, 0x2) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:05 executing program 0: read$qrtrtun(0xffffffffffffffff, &(0x7f0000000300)=""/227, 0xe3) (async) read$qrtrtun(0xffffffffffffffff, &(0x7f0000000300)=""/227, 0xe3) r0 = socket$packet(0x11, 0x2, 0x300) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000140)="b2f69a9fa653d6adc3788d67832992975531746790477fce7adb45788141d6afb61039f874cb4b0dad13", 0x2a) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/custom0\x00', 0x2, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21010000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x84, 0x0, 0x4, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_EEE_MODES_OURS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_EEE_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x5d04}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}]}, 0x84}, 0x1, 0x0, 0x0, 0x40000}, 0x8084) (async) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21010000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x84, 0x0, 0x4, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_EEE_MODES_OURS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_EEE_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x5d04}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}]}, 0x84}, 0x1, 0x0, 0x0, 0x40000}, 0x8084) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000400)="0ad4d130744d6ba73f5a5482e9989ae7cc23fdfe762d3e6caa1b0dc6b60e4bf92d8f587475ce60052b14fbd45ded36b17dc81700c13e272a2e4ceb78438b0d50edc8cb8d120095a7359fea55183580b2ff33e60f15e7f8340b411812798735e13605d177a53c6f297433e4115c7d0c776e2ac91409ccdcd9c29fd1bca3d3e091fd735a0dc5b03292067257ea13951fef927c7f0b53cfcf", 0x97) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) accept$packet(r2, 0x0, &(0x7f0000000200)) 08:48:05 executing program 0: read$qrtrtun(0xffffffffffffffff, &(0x7f0000000300)=""/227, 0xe3) r0 = socket$packet(0x11, 0x2, 0x300) (async, rerun: 32) write$qrtrtun(0xffffffffffffffff, &(0x7f0000000140)="b2f69a9fa653d6adc3788d67832992975531746790477fce7adb45788141d6afb61039f874cb4b0dad13", 0x2a) (rerun: 32) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/custom0\x00', 0x2, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21010000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x84, 0x0, 0x4, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_EEE_MODES_OURS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_EEE_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x5d04}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}]}, 0x84}, 0x1, 0x0, 0x0, 0x40000}, 0x8084) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000400)="0ad4d130744d6ba73f5a5482e9989ae7cc23fdfe762d3e6caa1b0dc6b60e4bf92d8f587475ce60052b14fbd45ded36b17dc81700c13e272a2e4ceb78438b0d50edc8cb8d120095a7359fea55183580b2ff33e60f15e7f8340b411812798735e13605d177a53c6f297433e4115c7d0c776e2ac91409ccdcd9c29fd1bca3d3e091fd735a0dc5b03292067257ea13951fef927c7f0b53cfcf", 0x97) (async, rerun: 32) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (rerun: 32) accept$packet(r2, 0x0, &(0x7f0000000200)) 08:48:05 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x86842, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'veth1_to_bridge\x00'}) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:05 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x1008}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:05 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0xfdfc, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:05 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0xffff0000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:05 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4231, 0xffffffffffffffff, 0x2) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:05 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x4000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:05 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0xfdfe, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:05 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x80000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:05 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) io_setup(0x4, &(0x7f0000000400)=0x0) io_cancel(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) (async) io_cancel(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x2, r0, &(0x7f0000000000), 0x0, 0x2, 0x0, 0x3}, &(0x7f0000000080)) r2 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r2, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r2, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 08:48:05 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x86842, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'veth1_to_bridge\x00'}) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:05 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x47ee}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:05 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0xfdff, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:05 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x100000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:05 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0xfe00, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:05 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x8700}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:05 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x200000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4231, 0xffffffffffffffff, 0x2) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) mmap$qrtrtun(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4231, 0xffffffffffffffff, 0x2) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:06 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0xfefd, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:06 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0xee47}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:06 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:06 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x86842, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'veth1_to_bridge\x00'}) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7a}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000084}, 0x884) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:06 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/52, 0x34, 0x40000000, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f0000000180)=""/192, &(0x7f0000000240)=0xc0) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="aa32eb07", @ANYRES16=r1, @ANYBLOB="00082dbd7000fcdbdf251000000008000600000000c008000700090000000800080023000000"], 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x48060) 08:48:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7a}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000084}, 0x884) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:06 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x400000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:06 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/52, 0x34, 0x40000000, 0x0, 0x0) (async) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 64) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f0000000180)=""/192, &(0x7f0000000240)=0xc0) (async, rerun: 64) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="aa32eb07", @ANYRES16=r1, @ANYBLOB="00082dbd7000fcdbdf251000000008000600000000c008000700090000000800080023000000"], 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x48060) 08:48:06 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffd, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:06 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x800000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:06 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/52, 0x34, 0x40000000, 0x0, 0x0) (async) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f0000000180)=""/192, &(0x7f0000000240)=0xc0) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="aa32eb07", @ANYRES16=r1, @ANYBLOB="00082dbd7000fcdbdf251000000008000600000000c008000700090000000800080023000000"], 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x48060) 08:48:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x300, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7a}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000084}, 0x884) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='hugetlb.2MB.rsvd.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001180)={0x14, r3, 0x101}, 0xf}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r3, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4004004}, 0x40800) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r5, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$FOU_CMD_ADD(r7, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, '\x00', 0x21}}]}, 0x28}}, 0x20000000) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x158, r5, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x4040000}, 0x4044091) recvfrom$packet(r0, &(0x7f0000000000)=""/55, 0x37, 0x40010000, 0x0, 0x0) 08:48:06 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0xffff, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) (rerun: 64) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001180)={0x14, r3, 0x101}, 0xf}}, 0x0) (async, rerun: 64) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r3, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4004004}, 0x40800) (async, rerun: 64) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r5, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$FOU_CMD_ADD(r7, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, '\x00', 0x21}}]}, 0x28}}, 0x20000000) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) (rerun: 32) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) (rerun: 32) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async, rerun: 32) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x158, r5, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x4040000}, 0x4044091) (rerun: 32) recvfrom$packet(r0, &(0x7f0000000000)=""/55, 0x37, 0x40010000, 0x0, 0x0) 08:48:06 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:06 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x500000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:06 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/43, 0x2b, 0x40010142, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_RINGS_GET(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xd4, r3, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x8044}, 0x8000) 08:48:06 executing program 0: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/43, 0x2b, 0x40010142, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_RINGS_GET(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xd4, r3, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x8044}, 0x8000) 08:48:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001180)={0x14, r3, 0x101}, 0xf}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r3, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4004004}, 0x40800) r4 = socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r5, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) (async, rerun: 32) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) (async, rerun: 32) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$FOU_CMD_ADD(r7, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, '\x00', 0x21}}]}, 0x28}}, 0x20000000) (async, rerun: 64) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (rerun: 64) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) (rerun: 64) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x158, r5, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x4040000}, 0x4044091) (async) recvfrom$packet(r0, &(0x7f0000000000)=""/55, 0x37, 0x40010000, 0x0, 0x0) 08:48:06 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/43, 0x2b, 0x40010142, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) (async) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) (async) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) sendmsg$ETHTOOL_MSG_RINGS_GET(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xd4, r3, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x8044}, 0x8000) 08:48:06 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/consoles\x00', 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/46, 0x2e, 0x2, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000100)="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", 0xff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) connect$packet(r0, &(0x7f00000000c0)={0x11, 0x1a, r1, 0x1, 0x5, 0x6, @broadcast}, 0x14) 08:48:06 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/eeprom_93cx6', 0x40302, 0x161) 08:48:06 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:06 executing program 2: socket$packet(0x11, 0x3, 0x300) (async) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/consoles\x00', 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/46, 0x2e, 0x2, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000100)="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", 0xff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) connect$packet(r0, &(0x7f00000000c0)={0x11, 0x1a, r1, 0x1, 0x5, 0x6, @broadcast}, 0x14) 08:48:06 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/eeprom_93cx6', 0x40302, 0x161) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/eeprom_93cx6', 0x40302, 0x161) (async) 08:48:06 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x600000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:06 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='hugetlb.2MB.rsvd.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:06 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/consoles\x00', 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000000)=""/46, 0x2e, 0x2, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000100)="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", 0xff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) connect$packet(r0, &(0x7f00000000c0)={0x11, 0x1a, r1, 0x1, 0x5, 0x6, @broadcast}, 0x14) 08:48:06 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:06 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x810000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:06 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:06 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/eeprom_93cx6', 0x40302, 0x161) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/eeprom_93cx6', 0x40302, 0x161) (async) 08:48:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async, rerun: 32) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='hugetlb.2MB.rsvd.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:06 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000200)={0x70, 0x0, &(0x7f00000000c0)=[@acquire_done, @acquire, @clear_death, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000000)={@fd, @flat=@weak_binder={0x77622a85, 0xa, 0x1}, @fda={0x66646185, 0x3, 0x0, 0x29}}, &(0x7f0000000080)={0x0, 0x18, 0x30}}}], 0xbb, 0x0, &(0x7f0000000140)="e966867b322e35c88ec7b82f8d8e985a28da0adff7a69ac729e7f1d3685be6b530e21a5291b8f0e0e4f73d0a9b3f03f5c1d1ca7d3a3583a1caf428219fae0d9c4ab5084da6808d73499da245aa336a9f10a5d32c4643a7f8c9accd717e2c674fd5be7c1fde4f2c2aedc1a0a6c56106c5e9c990cd19e7abc1deafa019945c0d9eb183b2bf41fa5d4d30aafa2ee230ed320af948c04ab99a93c0d2dee1abe5fe71988d45fd2639ddefe4917fb28a8a0252df44f93a96111960caf988"}) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:06 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:06 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x4000000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:06 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x400, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x92957901dafdf6a0}, 0x4004) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:06 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:06 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x400, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x92957901dafdf6a0}, 0x4004) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:06 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000200)={0x70, 0x0, &(0x7f00000000c0)=[@acquire_done, @acquire, @clear_death, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000000)={@fd, @flat=@weak_binder={0x77622a85, 0xa, 0x1}, @fda={0x66646185, 0x3, 0x0, 0x29}}, &(0x7f0000000080)={0x0, 0x18, 0x30}}}], 0xbb, 0x0, &(0x7f0000000140)="e966867b322e35c88ec7b82f8d8e985a28da0adff7a69ac729e7f1d3685be6b530e21a5291b8f0e0e4f73d0a9b3f03f5c1d1ca7d3a3583a1caf428219fae0d9c4ab5084da6808d73499da245aa336a9f10a5d32c4643a7f8c9accd717e2c674fd5be7c1fde4f2c2aedc1a0a6c56106c5e9c990cd19e7abc1deafa019945c0d9eb183b2bf41fa5d4d30aafa2ee230ed320af948c04ab99a93c0d2dee1abe5fe71988d45fd2639ddefe4917fb28a8a0252df44f93a96111960caf988"}) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:06 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x400, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x92957901dafdf6a0}, 0x4004) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000200)={0x70, 0x0, &(0x7f00000000c0)=[@acquire_done, @acquire, @clear_death, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000000)={@fd, @flat=@weak_binder={0x77622a85, 0xa, 0x1}, @fda={0x66646185, 0x3, 0x0, 0x29}}, &(0x7f0000000080)={0x0, 0x18, 0x30}}}], 0xbb, 0x0, &(0x7f0000000140)="e966867b322e35c88ec7b82f8d8e985a28da0adff7a69ac729e7f1d3685be6b530e21a5291b8f0e0e4f73d0a9b3f03f5c1d1ca7d3a3583a1caf428219fae0d9c4ab5084da6808d73499da245aa336a9f10a5d32c4643a7f8c9accd717e2c674fd5be7c1fde4f2c2aedc1a0a6c56106c5e9c990cd19e7abc1deafa019945c0d9eb183b2bf41fa5d4d30aafa2ee230ed320af948c04ab99a93c0d2dee1abe5fe71988d45fd2639ddefe4917fb28a8a0252df44f93a96111960caf988"}) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:06 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x47ee000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:06 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14, 0x800) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000040)={'tunl0\x00', r2, 0x700, 0x80, 0x1, 0x6, {{0x33, 0x4, 0x2, 0x3, 0xcc, 0x67, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010101, {[@noop, @cipso={0x86, 0x4d, 0x0, [{0x6, 0x2}, {0x7, 0x3, '.'}, {0x6, 0xe, "aba442191d001dd4eefc682b"}, {0x2, 0x4, "e788"}, {0x0, 0x6, "fe9a9466"}, {0x0, 0x12, "609b02c4ff85ab73a212354249000edc"}, {0x0, 0xd, "ee4eef4b3f22c6246ea921"}, {0x1, 0xb, "243449f00aac07eb7a"}]}, @cipso={0x86, 0x57, 0x3, [{0x7, 0x7, "b82a1d58fc"}, {0x5, 0x3, 'n'}, {0x6, 0xd, "9a38d6a760f156f10c82fd"}, {0x7, 0x4, "9f68"}, {0x6, 0xb, "f1c17a13c0eb619eb2"}, {0xa245c5e6e5794dba, 0x9, "1f441797e489c1"}, {0x2, 0x8, "6945313e12ae"}, {0x7, 0xd, "3468994dbd93318d2c3002"}, {0x7, 0xd, "36e9da16829490ff83b9cc"}]}, @noop, @lsrr={0x83, 0xb, 0x1c, [@rand_addr=0x64010100, @local]}, @ra={0x94, 0x4, 0x1}, @noop, @noop]}}}}}) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000044}, 0x4040010) bind$l2tp6(r3, &(0x7f0000000340)={0xa, 0x0, 0x9, @private0, 0x5, 0x2}, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r5 = getpid() ptrace$setregset(0x4205, r5, 0x0, 0x0) mq_notify(r4, &(0x7f0000000300)={0x0, 0x3b, 0x2, @tid=r5}) 08:48:06 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:06 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:06 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x8700000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:06 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x5000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:06 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:06 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x6000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:06 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0xffff000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:06 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x6, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:06 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x8100000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) connect$packet(r1, &(0x7f0000000000)={0x11, 0xff, r3, 0x1, 0x0, 0x6, @remote}, 0x14) 08:48:07 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:07 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:07 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x40000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/46, 0x2e, 0x2, 0x0, 0x0) 08:48:07 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) (async) r1 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14, 0x800) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000040)={'tunl0\x00', r2, 0x700, 0x80, 0x1, 0x6, {{0x33, 0x4, 0x2, 0x3, 0xcc, 0x67, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010101, {[@noop, @cipso={0x86, 0x4d, 0x0, [{0x6, 0x2}, {0x7, 0x3, '.'}, {0x6, 0xe, "aba442191d001dd4eefc682b"}, {0x2, 0x4, "e788"}, {0x0, 0x6, "fe9a9466"}, {0x0, 0x12, "609b02c4ff85ab73a212354249000edc"}, {0x0, 0xd, "ee4eef4b3f22c6246ea921"}, {0x1, 0xb, "243449f00aac07eb7a"}]}, @cipso={0x86, 0x57, 0x3, [{0x7, 0x7, "b82a1d58fc"}, {0x5, 0x3, 'n'}, {0x6, 0xd, "9a38d6a760f156f10c82fd"}, {0x7, 0x4, "9f68"}, {0x6, 0xb, "f1c17a13c0eb619eb2"}, {0xa245c5e6e5794dba, 0x9, "1f441797e489c1"}, {0x2, 0x8, "6945313e12ae"}, {0x7, 0xd, "3468994dbd93318d2c3002"}, {0x7, 0xd, "36e9da16829490ff83b9cc"}]}, @noop, @lsrr={0x83, 0xb, 0x1c, [@rand_addr=0x64010100, @local]}, @ra={0x94, 0x4, 0x1}, @noop, @noop]}}}}}) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000044}, 0x4040010) bind$l2tp6(r3, &(0x7f0000000340)={0xa, 0x0, 0x9, @private0, 0x5, 0x2}, 0x20) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r5 = getpid() ptrace$setregset(0x4205, r5, 0x0, 0x0) (async) ptrace$setregset(0x4205, r5, 0x0, 0x0) mq_notify(r4, &(0x7f0000000300)={0x0, 0x3b, 0x2, @tid=r5}) (async) mq_notify(r4, &(0x7f0000000300)={0x0, 0x3b, 0x2, @tid=r5}) 08:48:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) connect$packet(r1, &(0x7f0000000000)={0x11, 0xff, r3, 0x1, 0x0, 0x6, @remote}, 0x14) 08:48:07 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x8, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:07 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x47ee0000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:07 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:07 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) accept4$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14, 0x800) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000040)={'tunl0\x00', r2, 0x700, 0x80, 0x1, 0x6, {{0x33, 0x4, 0x2, 0x3, 0xcc, 0x67, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010101, {[@noop, @cipso={0x86, 0x4d, 0x0, [{0x6, 0x2}, {0x7, 0x3, '.'}, {0x6, 0xe, "aba442191d001dd4eefc682b"}, {0x2, 0x4, "e788"}, {0x0, 0x6, "fe9a9466"}, {0x0, 0x12, "609b02c4ff85ab73a212354249000edc"}, {0x0, 0xd, "ee4eef4b3f22c6246ea921"}, {0x1, 0xb, "243449f00aac07eb7a"}]}, @cipso={0x86, 0x57, 0x3, [{0x7, 0x7, "b82a1d58fc"}, {0x5, 0x3, 'n'}, {0x6, 0xd, "9a38d6a760f156f10c82fd"}, {0x7, 0x4, "9f68"}, {0x6, 0xb, "f1c17a13c0eb619eb2"}, {0xa245c5e6e5794dba, 0x9, "1f441797e489c1"}, {0x2, 0x8, "6945313e12ae"}, {0x7, 0xd, "3468994dbd93318d2c3002"}, {0x7, 0xd, "36e9da16829490ff83b9cc"}]}, @noop, @lsrr={0x83, 0xb, 0x1c, [@rand_addr=0x64010100, @local]}, @ra={0x94, 0x4, 0x1}, @noop, @noop]}}}}}) sendmsg$L2TP_CMD_NOOP(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000044}, 0x4040010) (async) bind$l2tp6(r3, &(0x7f0000000340)={0xa, 0x0, 0x9, @private0, 0x5, 0x2}, 0x20) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r5 = getpid() ptrace$setregset(0x4205, r5, 0x0, 0x0) mq_notify(r4, &(0x7f0000000300)={0x0, 0x3b, 0x2, @tid=r5}) 08:48:07 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:07 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x87, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:07 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x524001}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x305, 0x70bd28, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) 08:48:07 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x87000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:07 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xfe, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/46, 0x2e, 0x2, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000000)=""/46, 0x2e, 0x2, 0x0, 0x0) (async) 08:48:07 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async, rerun: 32) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) connect$packet(r1, &(0x7f0000000000)={0x11, 0xff, r3, 0x1, 0x0, 0x6, @remote}, 0x14) 08:48:07 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0xffff0000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:07 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x300, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:07 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x5}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:07 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x524001}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x305, 0x70bd28, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x524001}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x305, 0x70bd28, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) (async) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) 08:48:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000040)=r2, 0x1) 08:48:07 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x524001}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x305, 0x70bd28, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) (async) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)) (async) socket$inet6_udplite(0xa, 0x2, 0x88) 08:48:07 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x500, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:07 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x80000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:07 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x6}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/46, 0x2e, 0x2, 0x0, 0x0) 08:48:07 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x600, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:07 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x87}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000040)=r2, 0x1) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)) (async) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000040)=r2, 0x1) (async) 08:48:07 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x100000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000040)=r2, 0x1) (async) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000040)=r2, 0x1) 08:48:07 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x64, 0x0, 0x10, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_PEER_V4={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x3a}}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e24}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @private=0xa010101}]}, 0x64}, 0x1, 0x0, 0x0, 0xc0}, 0x4000) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:07 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000003c0)=0x14) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, 0x0, 0x108, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x36e4}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x80}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xf40}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x400c0c4) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000340)=r3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x891907ede7d23754}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x9}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x3}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20004000}, 0x48804) bind$packet(r0, &(0x7f0000000000)={0x11, 0x1, r3, 0x1, 0x2, 0x6, @broadcast}, 0x14) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x8bb}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x20}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000080) 08:48:07 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:07 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x700, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:07 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x200000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x2a, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.idle\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_COALESCE_GET(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa0, r4, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0xa0}}, 0x40000) 08:48:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) socket(0x2a, 0x0, 0x0) (async) r1 = socket(0x2a, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.idle\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r2) (async) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_COALESCE_GET(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa0, r4, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0xa0}}, 0x40000) 08:48:07 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:07 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x810, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:07 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) (async) r1 = socket(0x2a, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 32) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.idle\x00', 0x2, 0x0) (async, rerun: 32) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r2) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async, rerun: 64) sendmsg$ETHTOOL_MSG_COALESCE_GET(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa0, r4, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0xa0}}, 0x40000) (rerun: 64) 08:48:08 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x400000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:08 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x600}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:08 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1008, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r1, 0x107, 0x0, 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x8}, 0x8) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:08 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x500000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:08 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x64, 0x0, 0x10, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_PEER_V4={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x3a}}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e24}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @private=0xa010101}]}, 0x64}, 0x1, 0x0, 0x0, 0xc0}, 0x4000) (async) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:08 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) getsockname$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000003c0)=0x14) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, 0x0, 0x108, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x36e4}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x80}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xf40}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x400c0c4) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000340)=r3) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$BATADV_CMD_GET_DAT_CACHE(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x891907ede7d23754}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x9}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x3}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20004000}, 0x48804) bind$packet(r0, &(0x7f0000000000)={0x11, 0x1, r3, 0x1, 0x2, 0x6, @broadcast}, 0x14) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x8bb}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x20}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000080) 08:48:08 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x810}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r1, 0x107, 0x0, 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x8}, 0x8) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x8}, 0x8) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:08 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1008}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:08 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4000, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:08 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x600000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r1, 0x107, 0x0, 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x8}, 0x8) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x8}, 0x8) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:08 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x64, 0x0, 0x10, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_PEER_V4={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x3a}}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e24}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @private=0xa010101}]}, 0x64}, 0x1, 0x0, 0x0, 0xc0}, 0x4000) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:08 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x4000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:08 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x8700, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:08 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x810000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:08 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000000)=""/113, &(0x7f0000000080)=0x71) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:09 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000003c0)=0x14) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, 0x0, 0x108, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x36e4}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x80}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xf40}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x400c0c4) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000340)=r3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x891907ede7d23754}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x9}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x3}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20004000}, 0x48804) bind$packet(r0, &(0x7f0000000000)={0x11, 0x1, r3, 0x1, 0x2, 0x6, @broadcast}, 0x14) (async) bind$packet(r0, &(0x7f0000000000)={0x11, 0x1, r3, 0x1, 0x2, 0x6, @broadcast}, 0x14) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r4, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, 0x0, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x8bb}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x20}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000080) 08:48:09 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x4000000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:09 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x47ee}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:09 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xeffd, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:09 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_destroy(r1) io_cancel(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000140)="d293c0ec5031d4678415fd3580f6c734c16394c73b8d48309222fb25ea43308b4974ece27d22efb2a701fe72c3c830c1c8af14c88dc8ab42baf829e637e019dc4a0a4a4c9284adfed7579528362a04a04bbd809822478dfbcecbbdeb043699", 0x5f, 0x7, 0x0, 0x1}, &(0x7f0000000200)) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/rfkill', 0x0, 0x100) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f00000000c0)=0x2a, 0x4) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) 08:48:09 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000000)=""/113, &(0x7f0000000080)=0x71) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000000)=""/113, &(0x7f0000000080)=0x71) (async) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:09 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x8700}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:09 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xfcfd, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:09 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x47ee000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:09 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000000)=""/113, &(0x7f0000000080)=0x71) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:09 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_destroy(r1) io_cancel(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000140)="d293c0ec5031d4678415fd3580f6c734c16394c73b8d48309222fb25ea43308b4974ece27d22efb2a701fe72c3c830c1c8af14c88dc8ab42baf829e637e019dc4a0a4a4c9284adfed7579528362a04a04bbd809822478dfbcecbbdeb043699", 0x5f, 0x7, 0x0, 0x1}, &(0x7f0000000200)) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/rfkill', 0x0, 0x100) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/rfkill', 0x0, 0x100) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f00000000c0)=0x2a, 0x4) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) 08:48:09 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0xee47}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:10 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x8700000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:10 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xfdef, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:10 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x800000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:10 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/snd_intel_sdw_acpi', 0x1, 0x100) recvfrom$packet(r0, &(0x7f0000000080)=""/53, 0x35, 0x10000, 0x0, 0x0) 08:48:10 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x99) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = io_uring_setup(0x49a7, &(0x7f0000000040)={0x0, 0x7a53, 0x4, 0x0, 0xc1, 0x0, r2}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x12, r3, 0x94480000) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/27, 0x4d, 0x2040, 0x0, 0x0) 08:48:10 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) io_setup(0x8, &(0x7f0000000100)=0x0) io_destroy(r1) io_cancel(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000140)="d293c0ec5031d4678415fd3580f6c734c16394c73b8d48309222fb25ea43308b4974ece27d22efb2a701fe72c3c830c1c8af14c88dc8ab42baf829e637e019dc4a0a4a4c9284adfed7579528362a04a04bbd809822478dfbcecbbdeb043699", 0x5f, 0x7, 0x0, 0x1}, &(0x7f0000000200)) (async) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/rfkill', 0x0, 0x100) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f00000000c0)=0x2a, 0x4) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) 08:48:10 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/snd_intel_sdw_acpi', 0x1, 0x100) recvfrom$packet(r0, &(0x7f0000000080)=""/53, 0x35, 0x10000, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/snd_intel_sdw_acpi', 0x1, 0x100) (async) recvfrom$packet(r0, &(0x7f0000000080)=""/53, 0x35, 0x10000, 0x0, 0x0) (async) 08:48:10 executing program 0: socket$packet(0x11, 0x2, 0x300) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x99) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) (async) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = io_uring_setup(0x49a7, &(0x7f0000000040)={0x0, 0x7a53, 0x4, 0x0, 0xc1, 0x0, r2}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x12, r3, 0x94480000) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/27, 0x4d, 0x2040, 0x0, 0x0) 08:48:10 executing program 2: socket$packet(0x11, 0x2, 0x300) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/snd_intel_sdw_acpi', 0x1, 0x100) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/snd_intel_sdw_acpi', 0x1, 0x100) recvfrom$packet(r0, &(0x7f0000000080)=""/53, 0x35, 0x10000, 0x0, 0x0) 08:48:10 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x99) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = io_uring_setup(0x49a7, &(0x7f0000000040)={0x0, 0x7a53, 0x4, 0x0, 0xc1, 0x0, r2}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x12, r3, 0x94480000) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/27, 0x4d, 0x2040, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x99) (async) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) (async) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) io_uring_setup(0x49a7, &(0x7f0000000040)={0x0, 0x7a53, 0x4, 0x0, 0xc1, 0x0, r2}) (async) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x12, r3, 0x94480000) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/27, 0x4d, 0x2040, 0x0, 0x0) (async) 08:48:10 executing program 2: recvfrom$packet(0xffffffffffffffff, &(0x7f0000000600)=""/45, 0x2d, 0x40000002, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x12, 0xffffffffffffffff, 0x0) 08:48:10 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/52, 0x34, 0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000240)={r1, 0x1, 0x6, @local}, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, r2, 0x400, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1215}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40840}, 0x20040000) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000129bd7000fedbdf25030000000500020006000000040001800c00018008000100", @ANYRES32=0x0, @ANYBLOB="5a4d1a016921f2283c8bd73ac21b4f18067764fc30b2ba8954f50dbd55bccf9c1f8120cb52dfdb2186030d74aced1b99f960efcdd88aff99a076237da20135216e7984e6044348d8acbc903be9953bec28ad1f87eb4881f0cab132914ce77bfdf4d58c2fa8f2cb5ab096214ad08c9ab62767fe6bff04e0e8c1e038"], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x20000042) 08:48:10 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0xffff000000000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:10 executing program 2: recvfrom$packet(0xffffffffffffffff, &(0x7f0000000600)=""/45, 0x2d, 0x40000002, 0x0, 0x0) (async) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x12, 0xffffffffffffffff, 0x0) 08:48:10 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:10 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xfdfc, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:10 executing program 2: recvfrom$packet(0xffffffffffffffff, &(0x7f0000000600)=""/45, 0x2d, 0x40000002, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x12, 0xffffffffffffffff, 0x0) [ 1051.207053][T15125] batadv0: entered promiscuous mode [ 1051.213399][T15114] batadv0: left promiscuous mode 08:48:10 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:10 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/52, 0x34, 0x2, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000240)={r1, 0x1, 0x6, @local}, 0x10) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, r2, 0x400, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1215}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40840}, 0x20040000) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000129bd7000fedbdf25030000000500020006000000040001800c00018008000100", @ANYRES32=0x0, @ANYBLOB="5a4d1a016921f2283c8bd73ac21b4f18067764fc30b2ba8954f50dbd55bccf9c1f8120cb52dfdb2186030d74aced1b99f960efcdd88aff99a076237da20135216e7984e6044348d8acbc903be9953bec28ad1f87eb4881f0cab132914ce77bfdf4d58c2fa8f2cb5ab096214ad08c9ab62767fe6bff04e0e8c1e038"], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x20000042) 08:48:10 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x400, 0x1, 0xfffffff9, 0x3ff, 0xd0, 0x7fffffff, 0x6}, 0x1c) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) connect$packet(r2, &(0x7f0000000080)={0x11, 0x16, 0x0, 0x1, 0x81, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xd}}, 0x14) 08:48:10 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xfdfe, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:10 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:10 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:10 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/52, 0x34, 0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000240)={r1, 0x1, 0x6, @local}, 0x10) (async) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000240)={r1, 0x1, 0x6, @local}, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, r2, 0x400, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1215}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40840}, 0x20040000) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, r2, 0x400, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1215}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40840}, 0x20040000) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000129bd7000fedbdf25030000000500020006000000040001800c00018008000100", @ANYRES32=0x0, @ANYBLOB="5a4d1a016921f2283c8bd73ac21b4f18067764fc30b2ba8954f50dbd55bccf9c1f8120cb52dfdb2186030d74aced1b99f960efcdd88aff99a076237da20135216e7984e6044348d8acbc903be9953bec28ad1f87eb4881f0cab132914ce77bfdf4d58c2fa8f2cb5ab096214ad08c9ab62767fe6bff04e0e8c1e038"], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x20000042) [ 1051.453782][T15139] batadv0: entered promiscuous mode [ 1051.459226][T15128] batadv0: left promiscuous mode 08:48:10 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xfdff, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:10 executing program 3: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:10 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:10 executing program 0: r0 = getpid() ptrace$setregset(0x4205, r0, 0x0, 0x0) ptrace$setregset(0x4205, r0, 0x4, &(0x7f0000000200)={&(0x7f0000000140)="e1daf871a691d0d1a483b753ec443d23a1434780ccb25eb428fa63569ead4877890d94c1679314abae131ef452894dc3038ce30a8047be8e59986c7c289f5c3f6c743c4a2af32a2be1959a03e0d9c69e6de5486a1330c7dfbc3c72c1cb15f44bf87fbc85c4c2b5c6f1818406687bea13852ab5d19d88d11b3de4b410c5bf51b1a7619e6d0f231bf5e5", 0x89}) r1 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r2 = syz_io_uring_setup(0x326, &(0x7f0000000000)={0x0, 0x11a, 0x80, 0x1, 0x24b}, &(0x7f0000000080), &(0x7f00000000c0)) r3 = syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0xaad8, 0x80, 0x3, 0x243, 0x0, r2}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x3cf2, &(0x7f0000000200)={0x0, 0xb873, 0xc, 0x2, 0xa, 0x0, r3}, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) r5 = syz_io_uring_setup(0x16ba, &(0x7f0000000540)={0x0, 0x1074, 0x4, 0x3, 0x1001b1, 0x0, r2}, &(0x7f0000000380), &(0x7f00000005c0)=0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000780)={0xb4, 0x0, &(0x7f0000001980)=[@free_buffer, @reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000600)={@fd, @fd={0x66642a85, 0x0, r1}, @ptr={0x70742a85, 0x1, &(0x7f0000000980)=""/4096, 0x1000, 0x2, 0x25}}, &(0x7f0000000680)={0x0, 0x18, 0x30}}}, @enter_looper, @register_looper, @transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x50, 0x18, &(0x7f00000006c0)=ANY=[@ANYBLOB="8561646600000000020000000000000005000000000000003b00000000000000852a62730000000003000000000000000000000000000000852a62730111000002000000000000000000000000000700"], &(0x7f0000000740)={0x0, 0x20, 0x38}}}, @register_looper, @exit_looper, @decrefs={0x40046307, 0x1}], 0xf4, 0x0, &(0x7f0000001a40)="0c9119905d2b57af6dbf513e9ce5c86b51de6567ac4034a88d7ae643427d2783004e9f0cf03039abde3d75339a1ec2d6890b8fc73994e350d508f0b304b923cc053d1b1a93b602bb3e8846d836cc0baffcef24825772bfca9a0d588aae5cfa12a9d8447c60ec880afaac914d7dcb10ef5b9468d75491beaeedc1703cf19abe2e07cef87eeb50e7c1f7459d9442e34e0f38fe6917ef9c3e0b60090b6a5255e86246f7c751a0c6b7a37faf6d85932c104bdf953919d2d569c35088918254cb1982e85c23db3ca5ea7196e9565dbf0f271bed8a25517ff13e6e10c95f90f71cf445e6c93719fbe19de7befc41e633a3fe0e1c568395"}) syz_io_uring_submit(r4, r6, &(0x7f0000000400)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x6, 0x800, 0x0, 0x7, 0x0, 0x1}) syz_io_uring_setup(0x38a1, &(0x7f0000000380)={0x0, 0xb365, 0x100, 0x0, 0x80138, 0x0, r5}, &(0x7f0000000400), &(0x7f0000000440)=0x0) syz_io_uring_submit(r4, r7, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x4, 0x0, 0x0, 0x0, 0x1}) r8 = accept$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) recvfrom$packet(r8, &(0x7f0000000000)=""/59, 0x3b, 0x40000002, 0x0, 0x0) r10 = gettid() connect$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x1b, r9}, 0x14) ptrace$setregset(0x4205, r10, 0x6, &(0x7f0000000340)={&(0x7f0000000240)="7d678a2a6df0bf32ca2e9dbd842c6ff932124075a11bbd9abc7b4449c8fa8ecdf1ab426a85640a75639d7f9a06d26b70a4971a88954156794d3de51ff8a574d337835f43f455d29e888927520ef5d46cf2dd08e7c2c1905eaaf44e518b0f80957f60ededcbed556e16a88c007611c8f73cbb4fe456ba23cee1522d2eca67b36b756746f83431d21492dc77ca9fdce394f81c2a236ae67228fabd0d00f3f2d9667ebe6739eaa6dae68e9b9660045f599904a29c114d4bd773986dd54402de9bd1b89196331b7f3efde56731f958ab48c5e38e7a7f3dac1d68c801f327e891d7414c3c8edb09eb704fe633672a8581d0c7e91eb1", 0xf3}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r12 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r12, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r12, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r12, 0x8, '\x00', r13, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r14 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x4c0182, 0x0) openat$cgroup_int(r14, &(0x7f0000002540)='cpu.max\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r14, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r14, 0x8, '\x00', r15, r12, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="c8000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fbdbdf25030000004c00018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r13, @ANYBLOB="1400020076657468317f766972745f7769666900140002006e72300000000000000000000000000008000100", @ANYRES32, @ANYBLOB="0500050009000000200001801400020000000000000000000000000000000000080003000100000005000500cd0000003800018008000100", @ANYRES32=r15, @ANYBLOB="140002006272695167655f736c6176655f31000008000100", @ANYRES32=0x0, @ANYBLOB="080001003e52b881db23fad018336533130bdc343efd2838ff6b88bfe18b348f3821b7cb000145e118a5c8d8341e3491b4aba3e2b4aede0995934f66475b382379a381c305", @ANYRES32=r9, @ANYBLOB="0800030002000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40004) mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, 0xffffffffffffffff, 0x8000000) 08:48:10 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:10 executing program 0: r0 = getpid() ptrace$setregset(0x4205, r0, 0x0, 0x0) ptrace$setregset(0x4205, r0, 0x4, &(0x7f0000000200)={&(0x7f0000000140)="e1daf871a691d0d1a483b753ec443d23a1434780ccb25eb428fa63569ead4877890d94c1679314abae131ef452894dc3038ce30a8047be8e59986c7c289f5c3f6c743c4a2af32a2be1959a03e0d9c69e6de5486a1330c7dfbc3c72c1cb15f44bf87fbc85c4c2b5c6f1818406687bea13852ab5d19d88d11b3de4b410c5bf51b1a7619e6d0f231bf5e5", 0x89}) (async) ptrace$setregset(0x4205, r0, 0x4, &(0x7f0000000200)={&(0x7f0000000140)="e1daf871a691d0d1a483b753ec443d23a1434780ccb25eb428fa63569ead4877890d94c1679314abae131ef452894dc3038ce30a8047be8e59986c7c289f5c3f6c743c4a2af32a2be1959a03e0d9c69e6de5486a1330c7dfbc3c72c1cb15f44bf87fbc85c4c2b5c6f1818406687bea13852ab5d19d88d11b3de4b410c5bf51b1a7619e6d0f231bf5e5", 0x89}) r1 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r2 = syz_io_uring_setup(0x326, &(0x7f0000000000)={0x0, 0x11a, 0x80, 0x1, 0x24b}, &(0x7f0000000080), &(0x7f00000000c0)) syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0xaad8, 0x80, 0x3, 0x243, 0x0, r2}, &(0x7f0000000180), &(0x7f00000001c0)) (async) r3 = syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0xaad8, 0x80, 0x3, 0x243, 0x0, r2}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x3cf2, &(0x7f0000000200)={0x0, 0xb873, 0xc, 0x2, 0xa, 0x0, r3}, &(0x7f0000000280), &(0x7f00000002c0)) (async) syz_io_uring_setup(0x3cf2, &(0x7f0000000200)={0x0, 0xb873, 0xc, 0x2, 0xa, 0x0, r3}, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) r5 = syz_io_uring_setup(0x16ba, &(0x7f0000000540)={0x0, 0x1074, 0x4, 0x3, 0x1001b1, 0x0, r2}, &(0x7f0000000380), &(0x7f00000005c0)=0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000780)={0xb4, 0x0, &(0x7f0000001980)=[@free_buffer, @reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000600)={@fd, @fd={0x66642a85, 0x0, r1}, @ptr={0x70742a85, 0x1, &(0x7f0000000980)=""/4096, 0x1000, 0x2, 0x25}}, &(0x7f0000000680)={0x0, 0x18, 0x30}}}, @enter_looper, @register_looper, @transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x50, 0x18, &(0x7f00000006c0)=ANY=[@ANYBLOB="8561646600000000020000000000000005000000000000003b00000000000000852a62730000000003000000000000000000000000000000852a62730111000002000000000000000000000000000700"], &(0x7f0000000740)={0x0, 0x20, 0x38}}}, @register_looper, @exit_looper, @decrefs={0x40046307, 0x1}], 0xf4, 0x0, &(0x7f0000001a40)="0c9119905d2b57af6dbf513e9ce5c86b51de6567ac4034a88d7ae643427d2783004e9f0cf03039abde3d75339a1ec2d6890b8fc73994e350d508f0b304b923cc053d1b1a93b602bb3e8846d836cc0baffcef24825772bfca9a0d588aae5cfa12a9d8447c60ec880afaac914d7dcb10ef5b9468d75491beaeedc1703cf19abe2e07cef87eeb50e7c1f7459d9442e34e0f38fe6917ef9c3e0b60090b6a5255e86246f7c751a0c6b7a37faf6d85932c104bdf953919d2d569c35088918254cb1982e85c23db3ca5ea7196e9565dbf0f271bed8a25517ff13e6e10c95f90f71cf445e6c93719fbe19de7befc41e633a3fe0e1c568395"}) syz_io_uring_submit(r4, r6, &(0x7f0000000400)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x6, 0x800, 0x0, 0x7, 0x0, 0x1}) syz_io_uring_setup(0x38a1, &(0x7f0000000380)={0x0, 0xb365, 0x100, 0x0, 0x80138, 0x0, r5}, &(0x7f0000000400), &(0x7f0000000440)=0x0) syz_io_uring_submit(r4, r7, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x4, 0x0, 0x0, 0x0, 0x1}) (async) syz_io_uring_submit(r4, r7, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x4, 0x0, 0x0, 0x0, 0x1}) r8 = accept$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) recvfrom$packet(r8, &(0x7f0000000000)=""/59, 0x3b, 0x40000002, 0x0, 0x0) (async) recvfrom$packet(r8, &(0x7f0000000000)=""/59, 0x3b, 0x40000002, 0x0, 0x0) r10 = gettid() connect$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x1b, r9}, 0x14) (async) connect$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x1b, r9}, 0x14) ptrace$setregset(0x4205, r10, 0x6, &(0x7f0000000340)={&(0x7f0000000240)="7d678a2a6df0bf32ca2e9dbd842c6ff932124075a11bbd9abc7b4449c8fa8ecdf1ab426a85640a75639d7f9a06d26b70a4971a88954156794d3de51ff8a574d337835f43f455d29e888927520ef5d46cf2dd08e7c2c1905eaaf44e518b0f80957f60ededcbed556e16a88c007611c8f73cbb4fe456ba23cee1522d2eca67b36b756746f83431d21492dc77ca9fdce394f81c2a236ae67228fabd0d00f3f2d9667ebe6739eaa6dae68e9b9660045f599904a29c114d4bd773986dd54402de9bd1b89196331b7f3efde56731f958ab48c5e38e7a7f3dac1d68c801f327e891d7414c3c8edb09eb704fe633672a8581d0c7e91eb1", 0xf3}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r12 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r12, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r12, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r12, 0x8, '\x00', r13, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x4c0182, 0x0) (async) r14 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x4c0182, 0x0) openat$cgroup_int(r14, &(0x7f0000002540)='cpu.max\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r14, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r14, 0x8, '\x00', r15, r12, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="c8000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fbdbdf25030000004c00018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r13, @ANYBLOB="1400020076657468317f766972745f7769666900140002006e72300000000000000000000000000008000100", @ANYRES32, @ANYBLOB="0500050009000000200001801400020000000000000000000000000000000000080003000100000005000500cd0000003800018008000100", @ANYRES32=r15, @ANYBLOB="140002006272695167655f736c6176655f31000008000100", @ANYRES32=0x0, @ANYBLOB="080001003e52b881db23fad018336533130bdc343efd2838ff6b88bfe18b348f3821b7cb000145e118a5c8d8341e3491b4aba3e2b4aede0995934f66475b382379a381c305", @ANYRES32=r9, @ANYBLOB="0800030002000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40004) (async) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="c8000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fbdbdf25030000004c00018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r13, @ANYBLOB="1400020076657468317f766972745f7769666900140002006e72300000000000000000000000000008000100", @ANYRES32, @ANYBLOB="0500050009000000200001801400020000000000000000000000000000000000080003000100000005000500cd0000003800018008000100", @ANYRES32=r15, @ANYBLOB="140002006272695167655f736c6176655f31000008000100", @ANYRES32=0x0, @ANYBLOB="080001003e52b881db23fad018336533130bdc343efd2838ff6b88bfe18b348f3821b7cb000145e118a5c8d8341e3491b4aba3e2b4aede0995934f66475b382379a381c305", @ANYRES32=r9, @ANYBLOB="0800030002000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40004) mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, 0xffffffffffffffff, 0x8000000) (async) mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, 0xffffffffffffffff, 0x8000000) [ 1051.516094][T15143] batadv0: entered promiscuous mode [ 1051.525910][T15142] batadv0: left promiscuous mode 08:48:10 executing program 0: r0 = getpid() ptrace$setregset(0x4205, r0, 0x0, 0x0) (async) ptrace$setregset(0x4205, r0, 0x4, &(0x7f0000000200)={&(0x7f0000000140)="e1daf871a691d0d1a483b753ec443d23a1434780ccb25eb428fa63569ead4877890d94c1679314abae131ef452894dc3038ce30a8047be8e59986c7c289f5c3f6c743c4a2af32a2be1959a03e0d9c69e6de5486a1330c7dfbc3c72c1cb15f44bf87fbc85c4c2b5c6f1818406687bea13852ab5d19d88d11b3de4b410c5bf51b1a7619e6d0f231bf5e5", 0x89}) (async) r1 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r2 = syz_io_uring_setup(0x326, &(0x7f0000000000)={0x0, 0x11a, 0x80, 0x1, 0x24b}, &(0x7f0000000080), &(0x7f00000000c0)) r3 = syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0xaad8, 0x80, 0x3, 0x243, 0x0, r2}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x3cf2, &(0x7f0000000200)={0x0, 0xb873, 0xc, 0x2, 0xa, 0x0, r3}, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) (async) r5 = syz_io_uring_setup(0x16ba, &(0x7f0000000540)={0x0, 0x1074, 0x4, 0x3, 0x1001b1, 0x0, r2}, &(0x7f0000000380), &(0x7f00000005c0)=0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000780)={0xb4, 0x0, &(0x7f0000001980)=[@free_buffer, @reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000600)={@fd, @fd={0x66642a85, 0x0, r1}, @ptr={0x70742a85, 0x1, &(0x7f0000000980)=""/4096, 0x1000, 0x2, 0x25}}, &(0x7f0000000680)={0x0, 0x18, 0x30}}}, @enter_looper, @register_looper, @transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x50, 0x18, &(0x7f00000006c0)=ANY=[@ANYBLOB="8561646600000000020000000000000005000000000000003b00000000000000852a62730000000003000000000000000000000000000000852a62730111000002000000000000000000000000000700"], &(0x7f0000000740)={0x0, 0x20, 0x38}}}, @register_looper, @exit_looper, @decrefs={0x40046307, 0x1}], 0xf4, 0x0, &(0x7f0000001a40)="0c9119905d2b57af6dbf513e9ce5c86b51de6567ac4034a88d7ae643427d2783004e9f0cf03039abde3d75339a1ec2d6890b8fc73994e350d508f0b304b923cc053d1b1a93b602bb3e8846d836cc0baffcef24825772bfca9a0d588aae5cfa12a9d8447c60ec880afaac914d7dcb10ef5b9468d75491beaeedc1703cf19abe2e07cef87eeb50e7c1f7459d9442e34e0f38fe6917ef9c3e0b60090b6a5255e86246f7c751a0c6b7a37faf6d85932c104bdf953919d2d569c35088918254cb1982e85c23db3ca5ea7196e9565dbf0f271bed8a25517ff13e6e10c95f90f71cf445e6c93719fbe19de7befc41e633a3fe0e1c568395"}) (async) syz_io_uring_submit(r4, r6, &(0x7f0000000400)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x6, 0x800, 0x0, 0x7, 0x0, 0x1}) (async) syz_io_uring_setup(0x38a1, &(0x7f0000000380)={0x0, 0xb365, 0x100, 0x0, 0x80138, 0x0, r5}, &(0x7f0000000400), &(0x7f0000000440)=0x0) syz_io_uring_submit(r4, r7, &(0x7f0000000480)=@IORING_OP_ASYNC_CANCEL={0xe, 0x4, 0x0, 0x0, 0x0, 0x1}) r8 = accept$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) recvfrom$packet(r8, &(0x7f0000000000)=""/59, 0x3b, 0x40000002, 0x0, 0x0) (async) r10 = gettid() connect$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x1b, r9}, 0x14) (async) ptrace$setregset(0x4205, r10, 0x6, &(0x7f0000000340)={&(0x7f0000000240)="7d678a2a6df0bf32ca2e9dbd842c6ff932124075a11bbd9abc7b4449c8fa8ecdf1ab426a85640a75639d7f9a06d26b70a4971a88954156794d3de51ff8a574d337835f43f455d29e888927520ef5d46cf2dd08e7c2c1905eaaf44e518b0f80957f60ededcbed556e16a88c007611c8f73cbb4fe456ba23cee1522d2eca67b36b756746f83431d21492dc77ca9fdce394f81c2a236ae67228fabd0d00f3f2d9667ebe6739eaa6dae68e9b9660045f599904a29c114d4bd773986dd54402de9bd1b89196331b7f3efde56731f958ab48c5e38e7a7f3dac1d68c801f327e891d7414c3c8edb09eb704fe633672a8581d0c7e91eb1", 0xf3}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r12 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r12, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r12, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r12, 0x8, '\x00', r13, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r14 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x4c0182, 0x0) openat$cgroup_int(r14, &(0x7f0000002540)='cpu.max\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r14, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r14, 0x8, '\x00', r15, r12, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="c8000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000fbdbdf25030000004c00018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r13, @ANYBLOB="1400020076657468317f766972745f7769666900140002006e72300000000000000000000000000008000100", @ANYRES32, @ANYBLOB="0500050009000000200001801400020000000000000000000000000000000000080003000100000005000500cd0000003800018008000100", @ANYRES32=r15, @ANYBLOB="140002006272695167655f736c6176655f31000008000100", @ANYRES32=0x0, @ANYBLOB="080001003e52b881db23fad018336533130bdc343efd2838ff6b88bfe18b348f3821b7cb000145e118a5c8d8341e3491b4aba3e2b4aede0995934f66475b382379a381c305", @ANYRES32=r9, @ANYBLOB="0800030002000000"], 0xc8}, 0x1, 0x0, 0x0, 0x800}, 0x40004) (async) mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, 0xffffffffffffffff, 0x8000000) 08:48:10 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x400, 0x1, 0xfffffff9, 0x3ff, 0xd0, 0x7fffffff, 0x6}, 0x1c) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) connect$packet(r2, &(0x7f0000000080)={0x11, 0x16, 0x0, 0x1, 0x81, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xd}}, 0x14) 08:48:10 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xfe00, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:10 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 32) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (rerun: 32) 08:48:10 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:10 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/dvb_as102', 0x2, 0xd8) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:10 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:10 executing program 0: socket$packet(0x11, 0x2, 0x300) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/dvb_as102', 0x2, 0xd8) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:10 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/dvb_as102', 0x2, 0xd8) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/dvb_as102', 0x2, 0xd8) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:10 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x2, 0x4) r1 = accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14, 0x800) recvfrom$packet(r1, &(0x7f0000000040)=""/51, 0x33, 0x0, 0x0, 0x0) 08:48:10 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x2, 0x4) (async) r1 = accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14, 0x800) recvfrom$packet(r1, &(0x7f0000000040)=""/51, 0x33, 0x0, 0x0, 0x0) 08:48:10 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x2, 0x4) r1 = accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14, 0x800) recvfrom$packet(r1, &(0x7f0000000040)=""/51, 0x33, 0x0, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x2, 0x4) (async) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14, 0x800) (async) recvfrom$packet(r1, &(0x7f0000000040)=""/51, 0x33, 0x0, 0x0, 0x0) (async) 08:48:10 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x400, 0x1, 0xfffffff9, 0x3ff, 0xd0, 0x7fffffff, 0x6}, 0x1c) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) connect$packet(r2, &(0x7f0000000080)={0x11, 0x16, 0x0, 0x1, 0x81, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xd}}, 0x14) 08:48:11 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xfefd, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:11 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x5000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:11 executing program 3: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="24000000bdb8f20ce8f8afc5cc1df3280008e97a90cff427656b3a5735ffb3081e49bb37a9e39b31d5678132f42b71ac735f0bf107720e47a676d245a6a2a82e3aa234d88154d1eceefc86e0608a76619d314f86e69b242c28eea6cdeb1b4761a8673e22c79e7a86e2763610f0a54c38b4c5ddf547219900fda6aee66985a681409d9f3f07af1ad9e4eeda47", @ANYRES16=0x0, @ANYBLOB="000228bd7000ffdbdf250100000008000c00040000000800090002000000"], 0x24}}, 0x840) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x1e, 0xa, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r2) getgid() sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, r3, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x3f}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x4}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}]}, 0x4c}}, 0x24000804) 08:48:11 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:11 executing program 0: socket$packet(0x11, 0x2, 0x300) 08:48:11 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xfffd, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:11 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x6000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:11 executing program 0: socket$packet(0x11, 0x2, 0x300) 08:48:11 executing program 0: socket$packet(0x11, 0x2, 0x300) 08:48:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x307002, 0x41) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getitimer(0x2, &(0x7f0000000180)) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x74, r3, 0x400, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10}, 0x2404c450) 08:48:11 executing program 3: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="24000000bdb8f20ce8f8afc5cc1df3280008e97a90cff427656b3a5735ffb3081e49bb37a9e39b31d5678132f42b71ac735f0bf107720e47a676d245a6a2a82e3aa234d88154d1eceefc86e0608a76619d314f86e69b242c28eea6cdeb1b4761a8673e22c79e7a86e2763610f0a54c38b4c5ddf547219900fda6aee66985a681409d9f3f07af1ad9e4eeda47", @ANYRES16=0x0, @ANYBLOB="000228bd7000ffdbdf250100000008000c00040000000800090002000000"], 0x24}}, 0x840) (async, rerun: 64) r0 = socket$packet(0x11, 0x2, 0x300) (async, rerun: 64) r1 = socket(0x1e, 0xa, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async, rerun: 64) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r2) (rerun: 64) getgid() (async) sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, r3, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x3f}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x4}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}]}, 0x4c}}, 0x24000804) 08:48:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x307002, 0x41) (async) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getitimer(0x2, &(0x7f0000000180)) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x74, r3, 0x400, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10}, 0x2404c450) 08:48:11 executing program 3: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="24000000bdb8f20ce8f8afc5cc1df3280008e97a90cff427656b3a5735ffb3081e49bb37a9e39b31d5678132f42b71ac735f0bf107720e47a676d245a6a2a82e3aa234d88154d1eceefc86e0608a76619d314f86e69b242c28eea6cdeb1b4761a8673e22c79e7a86e2763610f0a54c38b4c5ddf547219900fda6aee66985a681409d9f3f07af1ad9e4eeda47", @ANYRES16=0x0, @ANYBLOB="000228bd7000ffdbdf250100000008000c00040000000800090002000000"], 0x24}}, 0x840) (async) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="24000000bdb8f20ce8f8afc5cc1df3280008e97a90cff427656b3a5735ffb3081e49bb37a9e39b31d5678132f42b71ac735f0bf107720e47a676d245a6a2a82e3aa234d88154d1eceefc86e0608a76619d314f86e69b242c28eea6cdeb1b4761a8673e22c79e7a86e2763610f0a54c38b4c5ddf547219900fda6aee66985a681409d9f3f07af1ad9e4eeda47", @ANYRES16=0x0, @ANYBLOB="000228bd7000ffdbdf250100000008000c00040000000800090002000000"], 0x24}}, 0x840) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x1e, 0xa, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), r2) getgid() (async) getgid() sendmsg$L2TP_CMD_SESSION_DELETE(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, r3, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x3f}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x4}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}]}, 0x4c}}, 0x24000804) 08:48:11 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:11 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x5}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:11 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x8100000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x307002, 0x41) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getitimer(0x2, &(0x7f0000000180)) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x74, r3, 0x400, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10}, 0x2404c450) socket$packet(0x11, 0x3, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x307002, 0x41) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) getitimer(0x2, &(0x7f0000000180)) (async) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x74, r3, 0x400, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10}, 0x2404c450) (async) 08:48:11 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x40000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:11 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:11 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) write$qrtrtun(r1, &(0x7f0000000040)="9ee354745d7d276d4e5ba603b473c6edecebccad8489b7223ae99f655b137b664072437d37841507453f6adfad2b91e0671543b3f746904feff10b2bc5641f2686a726a848c0b7bc3ad36f8c5f7e778b9545fd13eb80427991306f6f96a5032be0ee46fd5a4343f9181ee95310a701", 0x6f) r2 = shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) shmdt(r2) 08:48:11 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/46, 0x2e, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x1, 0x1, 0x4, 0x4}, {0x8, 0x7, 0x88, 0x20}, {0x1, 0x0, 0x20, 0x8}, {0x20, 0x20, 0x47, 0x6}, {0x4, 0x1, 0x52, 0x3}, {0x6, 0x1, 0x9, 0x7}]}, 0x10) 08:48:11 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x6}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:11 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/46, 0x2e, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x1, 0x1, 0x4, 0x4}, {0x8, 0x7, 0x88, 0x20}, {0x1, 0x0, 0x20, 0x8}, {0x20, 0x20, 0x47, 0x6}, {0x4, 0x1, 0x52, 0x3}, {0x6, 0x1, 0x9, 0x7}]}, 0x10) 08:48:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:11 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x47ee0000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:11 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x87}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:11 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) write$qrtrtun(r1, &(0x7f0000000040)="9ee354745d7d276d4e5ba603b473c6edecebccad8489b7223ae99f655b137b664072437d37841507453f6adfad2b91e0671543b3f746904feff10b2bc5641f2686a726a848c0b7bc3ad36f8c5f7e778b9545fd13eb80427991306f6f96a5032be0ee46fd5a4343f9181ee95310a701", 0x6f) (async) r2 = shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) shmdt(r2) 08:48:12 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:12 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x87000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:12 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:12 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0xffff0000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:12 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/46, 0x2e, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x1, 0x1, 0x4, 0x4}, {0x8, 0x7, 0x88, 0x20}, {0x1, 0x0, 0x20, 0x8}, {0x20, 0x20, 0x47, 0x6}, {0x4, 0x1, 0x52, 0x3}, {0x6, 0x1, 0x9, 0x7}]}, 0x10) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000000)=""/46, 0x2e, 0x2, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x1, 0x1, 0x4, 0x4}, {0x8, 0x7, 0x88, 0x20}, {0x1, 0x0, 0x20, 0x8}, {0x20, 0x20, 0x47, 0x6}, {0x4, 0x1, 0x52, 0x3}, {0x6, 0x1, 0x9, 0x7}]}, 0x10) (async) 08:48:12 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) write$qrtrtun(r1, &(0x7f0000000040)="9ee354745d7d276d4e5ba603b473c6edecebccad8489b7223ae99f655b137b664072437d37841507453f6adfad2b91e0671543b3f746904feff10b2bc5641f2686a726a848c0b7bc3ad36f8c5f7e778b9545fd13eb80427991306f6f96a5032be0ee46fd5a4343f9181ee95310a701", 0x6f) r2 = shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) shmdt(r2) 08:48:12 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x3}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:12 executing program 2: io_setup(0xfffff5ad, &(0x7f0000000000)=0x0) io_getevents(0x0, 0x5, 0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000080)={0x0, 0x989680}) io_cancel(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x3, 0xffffffffffffffff, &(0x7f0000000280)="7d4ca6b029119bdfa6dd6b127386aed0b17151779beef839ab8fba8fe0399fb21c22c9e816eccc63a5900ff249ff78f006e8374674e45899e3414f14137a85582a222ee4f49868b6815af3b802f745bd9488a8e8ab61897e2cdb8716abc422ed446982ccc43539dc81195440f89544b78ebd0974cd6b6dbed4000aba601f0c024b6fb7395142578831e59391d23768cb676f6ce01ae4", 0x96, 0x80004000, 0x0, 0x2}, &(0x7f0000000040)) socket$packet(0x11, 0x2, 0x300) 08:48:12 executing program 2: io_setup(0xfffff5ad, &(0x7f0000000000)=0x0) (async, rerun: 32) io_getevents(0x0, 0x5, 0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000080)={0x0, 0x989680}) (rerun: 32) io_cancel(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x3, 0xffffffffffffffff, &(0x7f0000000280)="7d4ca6b029119bdfa6dd6b127386aed0b17151779beef839ab8fba8fe0399fb21c22c9e816eccc63a5900ff249ff78f006e8374674e45899e3414f14137a85582a222ee4f49868b6815af3b802f745bd9488a8e8ab61897e2cdb8716abc422ed446982ccc43539dc81195440f89544b78ebd0974cd6b6dbed4000aba601f0c024b6fb7395142578831e59391d23768cb676f6ce01ae4", 0x96, 0x80004000, 0x0, 0x2}, &(0x7f0000000040)) (async, rerun: 64) socket$packet(0x11, 0x2, 0x300) (rerun: 64) 08:48:12 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/rng_core', 0x3c0, 0xa0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000180)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0xa0, 0x0, &(0x7f0000000300)="b5b4cadb9ec696dcea7f76b08941beea350443bfcb128f61fc9bfebf95aba20819b415334a40657884df1acba1cd6bf5cf6b5a0b612b496bee521f9e40685045bebb32e423fe4b9dce57130124e87c9eef1d7bcc0cc09c50e8787bbf8729194d5ea58619dbb25a2e2e42c12fb674f147ec032df1b28e7a1083bc561603da047762bdcb9313e6214f2308747d5c67e6f61e3e3d810d5fd8b184f190c031b8eb5e"}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fffffff}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x5afc}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x800) 08:48:12 executing program 2: io_setup(0xfffff5ad, &(0x7f0000000000)=0x0) io_getevents(0x0, 0x5, 0x6, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000080)={0x0, 0x989680}) (async) io_cancel(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x3, 0xffffffffffffffff, &(0x7f0000000280)="7d4ca6b029119bdfa6dd6b127386aed0b17151779beef839ab8fba8fe0399fb21c22c9e816eccc63a5900ff249ff78f006e8374674e45899e3414f14137a85582a222ee4f49868b6815af3b802f745bd9488a8e8ab61897e2cdb8716abc422ed446982ccc43539dc81195440f89544b78ebd0974cd6b6dbed4000aba601f0c024b6fb7395142578831e59391d23768cb676f6ce01ae4", 0x96, 0x80004000, 0x0, 0x2}, &(0x7f0000000040)) socket$packet(0x11, 0x2, 0x300) 08:48:12 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) accept$packet(r1, &(0x7f00000001c0), &(0x7f0000000200)=0x14) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/class/usbmon', 0x4080, 0x10) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x100000e, 0xa4011, r2, 0x180000000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendto$packet(r3, &(0x7f0000000000)="a33649cc906fc261106fab9f695cf4ac942705e84c05316e213365322c0ddc185dce1e4e4920bb107640a6229a48ce301420cd84432674a189dc82b6965643e2755613d46c88aae8ecffb02643f1827ebdf8339ee68d0c68ae5e89fb7079373790d7", 0x62, 0x4010, &(0x7f0000000100)={0x11, 0x2, r4, 0x1, 0xff, 0x6, @remote}, 0x14) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:12 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x600}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:12 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:12 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/rng_core', 0x3c0, 0xa0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000180)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0xa0, 0x0, &(0x7f0000000300)="b5b4cadb9ec696dcea7f76b08941beea350443bfcb128f61fc9bfebf95aba20819b415334a40657884df1acba1cd6bf5cf6b5a0b612b496bee521f9e40685045bebb32e423fe4b9dce57130124e87c9eef1d7bcc0cc09c50e8787bbf8729194d5ea58619dbb25a2e2e42c12fb674f147ec032df1b28e7a1083bc561603da047762bdcb9313e6214f2308747d5c67e6f61e3e3d810d5fd8b184f190c031b8eb5e"}) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) (async) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fffffff}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x5afc}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x800) 08:48:12 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.cpu_exclusive\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:12 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/rng_core', 0x3c0, 0xa0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000180)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0xa0, 0x0, &(0x7f0000000300)="b5b4cadb9ec696dcea7f76b08941beea350443bfcb128f61fc9bfebf95aba20819b415334a40657884df1acba1cd6bf5cf6b5a0b612b496bee521f9e40685045bebb32e423fe4b9dce57130124e87c9eef1d7bcc0cc09c50e8787bbf8729194d5ea58619dbb25a2e2e42c12fb674f147ec032df1b28e7a1083bc561603da047762bdcb9313e6214f2308747d5c67e6f61e3e3d810d5fd8b184f190c031b8eb5e"}) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) (async, rerun: 32) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7fffffff}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x5afc}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x800) (rerun: 32) 08:48:12 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x810}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:13 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.cpu_exclusive\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.cpu_exclusive\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:13 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:13 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x4}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:13 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) pipe2$watch_queue(&(0x7f0000000180), 0x80) (async) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) accept$packet(r1, &(0x7f00000001c0), &(0x7f0000000200)=0x14) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/class/usbmon', 0x4080, 0x10) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x100000e, 0xa4011, r2, 0x180000000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendto$packet(r3, &(0x7f0000000000)="a33649cc906fc261106fab9f695cf4ac942705e84c05316e213365322c0ddc185dce1e4e4920bb107640a6229a48ce301420cd84432674a189dc82b6965643e2755613d46c88aae8ecffb02643f1827ebdf8339ee68d0c68ae5e89fb7079373790d7", 0x62, 0x4010, &(0x7f0000000100)={0x11, 0x2, r4, 0x1, 0xff, 0x6, @remote}, 0x14) (async) sendto$packet(r3, &(0x7f0000000000)="a33649cc906fc261106fab9f695cf4ac942705e84c05316e213365322c0ddc185dce1e4e4920bb107640a6229a48ce301420cd84432674a189dc82b6965643e2755613d46c88aae8ecffb02643f1827ebdf8339ee68d0c68ae5e89fb7079373790d7", 0x62, 0x4010, &(0x7f0000000100)={0x11, 0x2, r4, 0x1, 0xff, 0x6, @remote}, 0x14) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:13 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x0, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x8ff}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x80}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7e15e36e}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xd6b}]}, 0x50}}, 0x80) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) getpeername$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0xf8, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x80}, 0x2000c054) 08:48:13 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1008}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:13 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x0, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x8ff}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x80}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7e15e36e}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xd6b}]}, 0x50}}, 0x80) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) getpeername$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) (async) getpeername$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0xf8, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x80}, 0x2000c054) 08:48:13 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.cpu_exclusive\x00', 0x2, 0x0) (async, rerun: 64) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:13 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x4000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:13 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:13 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, 0x0, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x8ff}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x80}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7e15e36e}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xd6b}]}, 0x50}}, 0x80) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) (async) getpeername$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0xf8, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x80}, 0x2000c054) 08:48:13 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) accept$packet(r1, &(0x7f00000001c0), &(0x7f0000000200)=0x14) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/class/usbmon', 0x4080, 0x10) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x100000e, 0xa4011, r2, 0x180000000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendto$packet(r3, &(0x7f0000000000)="a33649cc906fc261106fab9f695cf4ac942705e84c05316e213365322c0ddc185dce1e4e4920bb107640a6229a48ce301420cd84432674a189dc82b6965643e2755613d46c88aae8ecffb02643f1827ebdf8339ee68d0c68ae5e89fb7079373790d7", 0x62, 0x4010, &(0x7f0000000100)={0x11, 0x2, r4, 0x1, 0xff, 0x6, @remote}, 0x14) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) pipe2$watch_queue(&(0x7f0000000180), 0x80) (async) accept$packet(r1, &(0x7f00000001c0), &(0x7f0000000200)=0x14) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/class/usbmon', 0x4080, 0x10) (async) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x100000e, 0xa4011, r2, 0x180000000) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) (async) sendto$packet(r3, &(0x7f0000000000)="a33649cc906fc261106fab9f695cf4ac942705e84c05316e213365322c0ddc185dce1e4e4920bb107640a6229a48ce301420cd84432674a189dc82b6965643e2755613d46c88aae8ecffb02643f1827ebdf8339ee68d0c68ae5e89fb7079373790d7", 0x62, 0x4010, &(0x7f0000000100)={0x11, 0x2, r4, 0x1, 0xff, 0x6, @remote}, 0x14) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:13 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x3, 0x0, 0x0) 08:48:13 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x3, 0x0, 0x0) 08:48:14 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x47ee}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:14 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x5}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:14 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x3, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x3, 0x0, 0x0) 08:48:14 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:14 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x4040, 0x0, 0x0) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x48503, 0x82, 0x1}, 0x18) recvfrom$packet(r0, &(0x7f00000000c0)=""/53, 0x35, 0x40010002, 0x0, 0x0) 08:48:14 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = accept4$packet(r0, &(0x7f00000000c0), &(0x7f0000000040)=0x14, 0x800) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x103, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), r0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x50, 0xffffffffffffffff, 0x6acf8000) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e22}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x2f}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}]}, 0x38}, 0x1, 0x0, 0x0, 0x2}, 0x810) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0x810, r6, 0x10000000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) 08:48:14 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x4040, 0x0, 0x0) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x48503, 0x82, 0x1}, 0x18) recvfrom$packet(r0, &(0x7f00000000c0)=""/53, 0x35, 0x40010002, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendto$packet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x4040, 0x0, 0x0) (async) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x48503, 0x82, 0x1}, 0x18) (async) recvfrom$packet(r0, &(0x7f00000000c0)=""/53, 0x35, 0x40010002, 0x0, 0x0) (async) 08:48:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x18, r0}, 0x18) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)=0x1) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:14 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = accept4$packet(r0, &(0x7f00000000c0), &(0x7f0000000040)=0x14, 0x800) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x103, 0x0, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), r0) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x50, 0xffffffffffffffff, 0x6acf8000) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e22}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x2f}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}]}, 0x38}, 0x1, 0x0, 0x0, 0x2}, 0x810) (async) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0x810, r6, 0x10000000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) 08:48:14 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x4040, 0x0, 0x0) (async) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x48503, 0x82, 0x1}, 0x18) (async) recvfrom$packet(r0, &(0x7f00000000c0)=""/53, 0x35, 0x40010002, 0x0, 0x0) 08:48:14 executing program 2: socket$packet(0x11, 0x3, 0x300) (async) socket$packet(0x11, 0x3, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = accept4$packet(r0, &(0x7f00000000c0), &(0x7f0000000040)=0x14, 0x800) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x103, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x50, 0xffffffffffffffff, 0x6acf8000) (async) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x50, 0xffffffffffffffff, 0x6acf8000) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$FOU_CMD_DEL(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r3, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e22}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x2f}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}]}, 0x38}, 0x1, 0x0, 0x0, 0x2}, 0x810) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0x810, r6, 0x10000000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) 08:48:14 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000180)={'tunl0\x00', 0x0, 0x8000, 0x20, 0xb0, 0x8, {{0x10, 0x4, 0x1, 0x6, 0x40, 0x68, 0x0, 0x20, 0x4, 0x0, @loopback, @multicast2, {[@rr={0x7, 0x17, 0xcb, [@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x14, 0xff, 0x3, 0x8, [{@loopback, 0x4}, {@rand_addr=0x64010101, 0x4}]}]}}}}}) connect$packet(r1, &(0x7f0000000140)={0x11, 0x1c, r2, 0x1, 0x0, 0x6, @random="752edb1ae852"}, 0x14) socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000040)=""/45, 0xffffffffffffffc2, 0x2, 0x0, 0x0) 08:48:14 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:15 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x6}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:15 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x8700}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:15 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:15 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x18, r0}, 0x18) (async) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)=0x1) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:15 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000180)={'tunl0\x00', 0x0, 0x8000, 0x20, 0xb0, 0x8, {{0x10, 0x4, 0x1, 0x6, 0x40, 0x68, 0x0, 0x20, 0x4, 0x0, @loopback, @multicast2, {[@rr={0x7, 0x17, 0xcb, [@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x14, 0xff, 0x3, 0x8, [{@loopback, 0x4}, {@rand_addr=0x64010101, 0x4}]}]}}}}}) connect$packet(r1, &(0x7f0000000140)={0x11, 0x1c, r2, 0x1, 0x0, 0x6, @random="752edb1ae852"}, 0x14) socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000040)=""/45, 0xffffffffffffffc2, 0x2, 0x0, 0x0) 08:48:15 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x87, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:15 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0xee47}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:15 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:15 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x800000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x18, r0}, 0x18) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)=0x1) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x18, r0}, 0x18) (async) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)=0x1) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:15 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x500, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:16 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14, 0x800) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, 0x0, 0x85, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0x28}}, @FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x840}, 0x8000) 08:48:16 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x7}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:16 executing program 2: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:16 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:16 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x600, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:16 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async, rerun: 32) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000180)={'tunl0\x00', 0x0, 0x8000, 0x20, 0xb0, 0x8, {{0x10, 0x4, 0x1, 0x6, 0x40, 0x68, 0x0, 0x20, 0x4, 0x0, @loopback, @multicast2, {[@rr={0x7, 0x17, 0xcb, [@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @multicast1, @empty]}, @timestamp_prespec={0x44, 0x14, 0xff, 0x3, 0x8, [{@loopback, 0x4}, {@rand_addr=0x64010101, 0x4}]}]}}}}}) (rerun: 32) connect$packet(r1, &(0x7f0000000140)={0x11, 0x1c, r2, 0x1, 0x0, 0x6, @random="752edb1ae852"}, 0x14) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000040)=""/45, 0xffffffffffffffc2, 0x2, 0x0, 0x0) 08:48:16 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x8, 0x12) r1 = socket(0x2a, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x1, r0, &(0x7f00000002c0)="5622a640e811e3eebf73a1b9d2c58a9b2edc1f9a6a41782167e9a241184ae8ac7c0ed590a91c11fcfcb2dfd06c5fb47f43a427444b7b63186a4e3a32f7b24796af98fe27b99b9cfb4c47f2c1e55cc990ba4c3faf0cc50bc0dec05ef3e90d49674e4ccaacf4f8fac3562eeabb06cd8fd84d9d431b921a27ebffac810134ca4cc1a7d48954f61d4f5f4574766156521c3cca55a100f48fdaac7911d9bdba3962ddc4a270dd31bcc58d8b56ecc2f7ce6155bf8b3501570c", 0xb6, 0x1, 0x0, 0x2, r2}, &(0x7f00000003c0)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/mdstat\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r3) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xfffffffffffffebb, &(0x7f0000000180)={&(0x7f0000000700)=ANY=[@ANYBLOB="948dc42a1faa60e8", @ANYRES16=r5, @ANYBLOB="22002cbd7000ffdbdf25120000005800018008000100", @ANYRES32=r1, @ANYBLOB="080003000000000008000300010000001409000000696d36726567300000000000000000a6619bee0100000008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000300010000000800030001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x24008885}, 0x20004800) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000006c0)={0x70, 0x0, &(0x7f0000000640)=[@reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000500)={@flat=@binder={0x73622a85, 0x1001, 0x1}, @ptr={0x70742a85, 0x1, &(0x7f0000000440)=""/30, 0x1e, 0x2, 0x30}, @ptr={0x70742a85, 0x0, &(0x7f0000000480)=""/76, 0x4c, 0x1, 0x31}}, &(0x7f0000000580)={0x0, 0x18, 0x40}}}, @increfs_done={0x40106308, 0x1}, @acquire={0x40046305, 0x1}, @clear_death], 0x0, 0x0, &(0x7f00000005c0)}) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000280)=@req={0x0, 0x0, 0x1, 0x9811}, 0xa52d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r3) 08:48:16 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14, 0x800) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, 0x0, 0x85, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0x28}}, @FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x840}, 0x8000) 08:48:16 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x8, 0x12) r1 = socket(0x2a, 0x0, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x1, r0, &(0x7f00000002c0)="5622a640e811e3eebf73a1b9d2c58a9b2edc1f9a6a41782167e9a241184ae8ac7c0ed590a91c11fcfcb2dfd06c5fb47f43a427444b7b63186a4e3a32f7b24796af98fe27b99b9cfb4c47f2c1e55cc990ba4c3faf0cc50bc0dec05ef3e90d49674e4ccaacf4f8fac3562eeabb06cd8fd84d9d431b921a27ebffac810134ca4cc1a7d48954f61d4f5f4574766156521c3cca55a100f48fdaac7911d9bdba3962ddc4a270dd31bcc58d8b56ecc2f7ce6155bf8b3501570c", 0xb6, 0x1, 0x0, 0x2, r2}, &(0x7f00000003c0)) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/mdstat\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r3) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xfffffffffffffebb, &(0x7f0000000180)={&(0x7f0000000700)=ANY=[@ANYBLOB="948dc42a1faa60e8", @ANYRES16=r5, @ANYBLOB="22002cbd7000ffdbdf25120000005800018008000100", @ANYRES32=r1, @ANYBLOB="080003000000000008000300010000001409000000696d36726567300000000000000000a6619bee0100000008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000300010000000800030001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x24008885}, 0x20004800) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) (async) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000006c0)={0x70, 0x0, &(0x7f0000000640)=[@reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000500)={@flat=@binder={0x73622a85, 0x1001, 0x1}, @ptr={0x70742a85, 0x1, &(0x7f0000000440)=""/30, 0x1e, 0x2, 0x30}, @ptr={0x70742a85, 0x0, &(0x7f0000000480)=""/76, 0x4c, 0x1, 0x31}}, &(0x7f0000000580)={0x0, 0x18, 0x40}}}, @increfs_done={0x40106308, 0x1}, @acquire={0x40046305, 0x1}, @clear_death], 0x0, 0x0, &(0x7f00000005c0)}) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000280)=@req={0x0, 0x0, 0x1, 0x9811}, 0xa52d) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r3) 08:48:16 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x8, 0x12) r1 = socket(0x2a, 0x0, 0x0) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x1, r0, &(0x7f00000002c0)="5622a640e811e3eebf73a1b9d2c58a9b2edc1f9a6a41782167e9a241184ae8ac7c0ed590a91c11fcfcb2dfd06c5fb47f43a427444b7b63186a4e3a32f7b24796af98fe27b99b9cfb4c47f2c1e55cc990ba4c3faf0cc50bc0dec05ef3e90d49674e4ccaacf4f8fac3562eeabb06cd8fd84d9d431b921a27ebffac810134ca4cc1a7d48954f61d4f5f4574766156521c3cca55a100f48fdaac7911d9bdba3962ddc4a270dd31bcc58d8b56ecc2f7ce6155bf8b3501570c", 0xb6, 0x1, 0x0, 0x2, r2}, &(0x7f00000003c0)) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/mdstat\x00', 0x0, 0x0) (async) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r3) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xfffffffffffffebb, &(0x7f0000000180)={&(0x7f0000000700)=ANY=[@ANYBLOB="948dc42a1faa60e8", @ANYRES16=r5, @ANYBLOB="22002cbd7000ffdbdf25120000005800018008000100", @ANYRES32=r1, @ANYBLOB="080003000000000008000300010000001409000000696d36726567300000000000000000a6619bee0100000008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000300010000000800030001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x24008885}, 0x20004800) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) (async) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000006c0)={0x70, 0x0, &(0x7f0000000640)=[@reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000500)={@flat=@binder={0x73622a85, 0x1001, 0x1}, @ptr={0x70742a85, 0x1, &(0x7f0000000440)=""/30, 0x1e, 0x2, 0x30}, @ptr={0x70742a85, 0x0, &(0x7f0000000480)=""/76, 0x4c, 0x1, 0x31}}, &(0x7f0000000580)={0x0, 0x18, 0x40}}}, @increfs_done={0x40106308, 0x1}, @acquire={0x40046305, 0x1}, @clear_death], 0x0, 0x0, &(0x7f00000005c0)}) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000280)=@req={0x0, 0x0, 0x1, 0x9811}, 0xa52d) syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r3) 08:48:16 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x2000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:16 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req={0xe62, 0x7fff, 0x2, 0x9}, 0x10) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:16 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x810, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:17 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x1008, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:17 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:17 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:17 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x8}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:17 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req={0xe62, 0x7fff, 0x2, 0x9}, 0x10) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) socket$packet(0x11, 0x2, 0x300) (async) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req={0xe62, 0x7fff, 0x2, 0x9}, 0x10) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:17 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14, 0x800) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, 0x0, 0x85, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0x28}}, @FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr=' \x01\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x840}, 0x8000) 08:48:17 executing program 3: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req={0xe62, 0x7fff, 0x2, 0x9}, 0x10) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:17 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x4000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:17 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:17 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x4000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:17 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x1f, 0x800, 0x4) accept$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000300)=0x14) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r3, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x800}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x810}, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r3, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xde0000}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_int(r5, &(0x7f0000000280)='memory.swap.high\x00', 0x2, 0x0) 08:48:17 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0xcc8c, 0x6, 0x6, 0x4, 0xea0b, 0xf00000}, 0x1c) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:17 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x5000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:17 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x1f, 0x800, 0x4) accept$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000300)=0x14) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r3, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x800}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x810}, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r3, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xde0000}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_int(r5, &(0x7f0000000280)='memory.swap.high\x00', 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x1f, 0x800, 0x4) (async) accept$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000300)=0x14) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r3, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x800}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x810}, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r3, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xde0000}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r5, &(0x7f0000000280)='memory.swap.high\x00', 0x2, 0x0) (async) 08:48:17 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x47ee, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:18 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x87}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:18 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket(0x1f, 0x800, 0x4) accept$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000300)=0x14) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r3, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x800}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x810}, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r3, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xde0000}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000001) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r5, &(0x7f0000000280)='memory.swap.high\x00', 0x2, 0x0) 08:48:18 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0xcc8c, 0x6, 0x6, 0x4, 0xea0b, 0xf00000}, 0x1c) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) (async) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0xcc8c, 0x6, 0x6, 0x4, 0xea0b, 0xf00000}, 0x1c) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:18 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x8700, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:18 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x6000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:18 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:18 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)=r1) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:18 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async, rerun: 64) socket(0x2a, 0x0, 0x0) (async, rerun: 64) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0xcc8c, 0x6, 0x6, 0x4, 0xea0b, 0xf00000}, 0x1c) (async, rerun: 64) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:18 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)=0x99d) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:18 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x8100000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:18 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0xee47, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:18 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x800000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:19 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)=r1) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:19 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0xfe}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:19 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)=0x99d) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)=0x99d) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:19 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x1000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:19 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x2000, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0xffffffffffffffe5, 0x800) r2 = socket$packet(0x11, 0x2, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvfrom$packet(r2, &(0x7f0000000100)=""/56, 0x38, 0x1d9dc14854bfeb94, 0x0, 0x4a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/class/ieee80211', 0x200080, 0xa) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/key-users\x00', 0x0, 0x0) r5 = getpid() ptrace$setregset(0x4205, r5, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000200)=r5, 0x12) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r4, 0x111, 0x5, 0x80000001, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x0, 0x0, r0, 0x5, '\x00', r1, r3, 0x3, 0x2}, 0x48) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) 08:48:19 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x40000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:19 executing program 2: socket$packet(0x11, 0x2, 0x300) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x2000, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 64) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0xffffffffffffffe5, 0x800) (async, rerun: 64) r2 = socket$packet(0x11, 0x2, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) (async) recvfrom$packet(r2, &(0x7f0000000100)=""/56, 0x38, 0x1d9dc14854bfeb94, 0x0, 0x4a) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/class/ieee80211', 0x200080, 0xa) (async) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/key-users\x00', 0x0, 0x0) r5 = getpid() ptrace$setregset(0x4205, r5, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000200)=r5, 0x12) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r4, 0x111, 0x5, 0x80000001, 0x4) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x0, 0x0, r0, 0x5, '\x00', r1, r3, 0x3, 0x2}, 0x48) (async) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) 08:48:19 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x2000, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0xffffffffffffffe5, 0x800) socket$packet(0x11, 0x2, 0x300) (async) r2 = socket$packet(0x11, 0x2, 0x300) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvfrom$packet(r2, &(0x7f0000000100)=""/56, 0x38, 0x1d9dc14854bfeb94, 0x0, 0x4a) (async) recvfrom$packet(r2, &(0x7f0000000100)=""/56, 0x38, 0x1d9dc14854bfeb94, 0x0, 0x4a) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/class/ieee80211', 0x200080, 0xa) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/key-users\x00', 0x0, 0x0) getpid() (async) r5 = getpid() ptrace$setregset(0x4205, r5, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000200)=r5, 0x12) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r4, 0x111, 0x5, 0x80000001, 0x4) (async) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r4, 0x111, 0x5, 0x80000001, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x0, 0x0, r0, 0x5, '\x00', r1, r3, 0x3, 0x2}, 0x48) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) 08:48:19 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000010}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, r1, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x4}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gretap0\x00'}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:19 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000010}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, r1, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x4}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gretap0\x00'}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:19 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000010}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, r1, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x4}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gretap0\x00'}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast2}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:19 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)=0x99d) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:19 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)=r1) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)=r1) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:20 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x2000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:20 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x300}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:20 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) read$qrtrtun(r1, &(0x7f0000000000)=""/86, 0x56) 08:48:20 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x47ee0000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:20 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) recvfrom$packet(r1, &(0x7f0000000000)=""/210, 0xd2, 0x2040, &(0x7f0000000100)={0x11, 0xc, r3, 0x1, 0x8, 0x6, @remote}, 0x14) 08:48:20 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x100, 0x70bd2a, 0x7f, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_PEER_V6={0x14, 0x9, @remote}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x11}]}, 0x54}, 0x1, 0x0, 0x0, 0x8880}, 0x80) r4 = getpid() ptrace$setregset(0x4205, r4, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000000)=r4, 0x12) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:20 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x3000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:20 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 32) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async, rerun: 32) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x100, 0x70bd2a, 0x7f, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_PEER_V6={0x14, 0x9, @remote}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x11}]}, 0x54}, 0x1, 0x0, 0x0, 0x8880}, 0x80) r4 = getpid() ptrace$setregset(0x4205, r4, 0x0, 0x0) (async) write$cgroup_pid(r2, &(0x7f0000000000)=r4, 0x12) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:20 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) read$qrtrtun(r1, &(0x7f0000000000)=""/86, 0x56) 08:48:20 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x87000000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:20 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:20 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0xffff0000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:20 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) read$qrtrtun(r1, &(0x7f0000000000)=""/86, 0x56) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) read$qrtrtun(r1, &(0x7f0000000000)=""/86, 0x56) (async) 08:48:21 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x5000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:21 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 32) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) (rerun: 32) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x100, 0x70bd2a, 0x7f, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_PEER_V6={0x14, 0x9, @remote}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x11}]}, 0x54}, 0x1, 0x0, 0x0, 0x8880}, 0x80) (async) r4 = getpid() ptrace$setregset(0x4205, r4, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000000)=r4, 0x12) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 64) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (rerun: 64) 08:48:21 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000040)=r1, 0x1) r2 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r2, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:21 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x500}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:21 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:21 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) recvfrom$packet(r1, &(0x7f0000000000)=""/210, 0xd2, 0x2040, &(0x7f0000000100)={0x11, 0xc, r3, 0x1, 0x8, 0x6, @remote}, 0x14) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) recvfrom$packet(r1, &(0x7f0000000000)=""/210, 0xd2, 0x2040, &(0x7f0000000100)={0x11, 0xc, r3, 0x1, 0x8, 0x6, @remote}, 0x14) (async) 08:48:21 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x6000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:21 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x8, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) recvfrom$packet(r1, &(0x7f0000000000)=""/210, 0xd2, 0x2040, &(0x7f0000000100)={0x11, 0xc, r3, 0x1, 0x8, 0x6, @remote}, 0x14) 08:48:21 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x3, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:21 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x11, 0x0, 0xfffffffe) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, 0x0, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'pim6reg\x00'}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x70}, 0x1, 0x0, 0x0, 0x840}, 0x24004400) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000080)={r5, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) connect$packet(r1, &(0x7f0000000000)={0x11, 0xf5, 0x0, 0x1, 0xfc, 0x6, @broadcast}, 0x14) 08:48:21 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x11, 0x0, 0xfffffffe) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, 0x0, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'pim6reg\x00'}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x70}, 0x1, 0x0, 0x0, 0x840}, 0x24004400) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000080)={r5, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) connect$packet(r1, &(0x7f0000000000)={0x11, 0xf5, 0x0, 0x1, 0xfc, 0x6, @broadcast}, 0x14) 08:48:21 executing program 0: r0 = shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) shmdt(r0) shmat(0xffffffffffffffff, &(0x7f0000003000/0x1000)=nil, 0x1000) r1 = socket$packet(0x11, 0x2, 0x300) shmat(0xffffffffffffffff, &(0x7f0000003000/0x2000)=nil, 0x6000) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000008000/0x4000)=nil, 0xcd1, &(0x7f0000000280)='\xffb\x90mg\x02\x82D#\xa1\xb3\xc1\x91\xd1=:O\t\xb7\xd6\xe4R\xfaM\x9f.\x10\xa8\xb2y\xcb.\xfayU\b\xf4\x89\x03\xa8W6\x88c\x18R\xb8\xe3Z@\xf4\xd5\x8b i\xb655\x16p\xa6\x92i\xf33yX\xad\x7fa\x87u>\x8b\xe4\xf0#\xfe\"\xab\x9a\x11\xdd\xe9o') sendto$packet(r1, &(0x7f0000000000)="9d937ca002974cd73ed693b347837c04c1a24250ec1fbd50e9112ac9879757e6b09727ecc66ece1d8d0ad4711b7b45006c79d1dca886056acd8a1ccc5ae2f17134ded030ef4814e5e4d93f624a3fd562811db8606fa17acac15c437465d1ad2032b57f225d211a91a8db7c67353ffcf330586272b68923afcb26a2299bf5907f831400308d36624539bc1665285151f6eb1262e61716f4a2499c3c6574189a62fac517ad1e9bb5e3e01c6088ca8be91c8e7b4bbb2358b04b2e6a14fd2e88d0972a16ebc89f02eec919763f13ae6b89fc", 0xd0, 0x0, &(0x7f0000000180)={0x11, 0xc, r2, 0x1, 0x40}, 0x14) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = shmget$private(0x0, 0x1000, 0x800, &(0x7f0000ffc000/0x1000)=nil) shmat(r3, &(0x7f0000ffc000/0x1000)=nil, 0x6000) shmat(r3, &(0x7f0000006000/0x4000)=nil, 0x0) r4 = syz_io_uring_setup(0x326, &(0x7f0000000000)={0x0, 0x11a, 0x80, 0x1, 0x24b}, &(0x7f0000000080), &(0x7f00000000c0)) r5 = syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0xaad8, 0x80, 0x3, 0x243, 0x0, r4}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x3cf2, &(0x7f0000000200)={0x0, 0xb873, 0xc, 0x2, 0xa, 0x0, r5}, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) syz_io_uring_setup(0x16b9, &(0x7f0000000300)={0x0, 0x1074, 0x200, 0x2, 0x1b1, 0x0, r4}, &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000400)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x6, 0x800, 0x0, 0x7, 0x0, 0x1}) r8 = syz_io_uring_setup(0x326, &(0x7f0000000000)={0x0, 0x11a, 0x80, 0x1, 0x24b}, &(0x7f0000000080), &(0x7f00000000c0)) r9 = syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0xaad8, 0x80, 0x3, 0x243, 0x0, r8}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x3cf2, &(0x7f0000000200)={0x0, 0xb873, 0xc, 0x2, 0xa, 0x0, r9}, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) syz_io_uring_setup(0x16b9, &(0x7f0000000300)={0x0, 0x1074, 0x200, 0x2, 0x1b1, 0x0, r8}, &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000400)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x6, 0x800, 0x0, 0x7, 0x0, 0x1}) syz_io_uring_submit(r6, r11, &(0x7f0000000300)=@IORING_OP_ACCEPT={0xd, 0x62, 0x0, r1, &(0x7f00000001c0)=0x80, &(0x7f0000000200)=@ieee802154={0x24, @long}, 0x0, 0x800, 0x1}) r12 = shmat(0x0, &(0x7f0000003000/0x1000)=nil, 0x2000) shmget(0x2, 0xc000, 0x800, &(0x7f0000ff2000/0xc000)=nil) shmdt(r12) 08:48:21 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x8100000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:21 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:21 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000040)=r1, 0x1) r2 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r2, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000040)=r1, 0x1) (async) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r2, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:21 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket(0x11, 0x0, 0xfffffffe) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, 0x0, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'pim6reg\x00'}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x70}, 0x1, 0x0, 0x0, 0x840}, 0x24004400) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000080)={r5, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) (async) connect$packet(r1, &(0x7f0000000000)={0x11, 0xf5, 0x0, 0x1, 0xfc, 0x6, @broadcast}, 0x14) 08:48:22 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x5, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:22 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) accept4$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x800) r2 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000000000)=0x7f, 0x4) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x9c, 0x0, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4041}, 0xc005) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000540)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r7, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x28, r8, 0x711, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x28}}, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r10, 0x8933, &(0x7f0000000540)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r11, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x28, r12, 0x711, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}]}]}, 0x28}}, 0x0) r14 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r14, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r14, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r14, 0x8, '\x00', r15, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$BATADV_CMD_SET_HARDIF(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r9}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7fff}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1f}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r13}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r15}]}, 0x64}}, 0x20000811) setsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000000c0), 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:22 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x600}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:22 executing program 0: r0 = shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) shmdt(r0) shmat(0xffffffffffffffff, &(0x7f0000003000/0x1000)=nil, 0x1000) socket$packet(0x11, 0x2, 0x300) (async) r1 = socket$packet(0x11, 0x2, 0x300) shmat(0xffffffffffffffff, &(0x7f0000003000/0x2000)=nil, 0x6000) (async) shmat(0xffffffffffffffff, &(0x7f0000003000/0x2000)=nil, 0x6000) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000008000/0x4000)=nil, 0xcd1, &(0x7f0000000280)='\xffb\x90mg\x02\x82D#\xa1\xb3\xc1\x91\xd1=:O\t\xb7\xd6\xe4R\xfaM\x9f.\x10\xa8\xb2y\xcb.\xfayU\b\xf4\x89\x03\xa8W6\x88c\x18R\xb8\xe3Z@\xf4\xd5\x8b i\xb655\x16p\xa6\x92i\xf33yX\xad\x7fa\x87u>\x8b\xe4\xf0#\xfe\"\xab\x9a\x11\xdd\xe9o') sendto$packet(r1, &(0x7f0000000000)="9d937ca002974cd73ed693b347837c04c1a24250ec1fbd50e9112ac9879757e6b09727ecc66ece1d8d0ad4711b7b45006c79d1dca886056acd8a1ccc5ae2f17134ded030ef4814e5e4d93f624a3fd562811db8606fa17acac15c437465d1ad2032b57f225d211a91a8db7c67353ffcf330586272b68923afcb26a2299bf5907f831400308d36624539bc1665285151f6eb1262e61716f4a2499c3c6574189a62fac517ad1e9bb5e3e01c6088ca8be91c8e7b4bbb2358b04b2e6a14fd2e88d0972a16ebc89f02eec919763f13ae6b89fc", 0xd0, 0x0, &(0x7f0000000180)={0x11, 0xc, r2, 0x1, 0x40}, 0x14) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = shmget$private(0x0, 0x1000, 0x800, &(0x7f0000ffc000/0x1000)=nil) shmat(r3, &(0x7f0000ffc000/0x1000)=nil, 0x6000) (async) shmat(r3, &(0x7f0000ffc000/0x1000)=nil, 0x6000) shmat(r3, &(0x7f0000006000/0x4000)=nil, 0x0) (async) shmat(r3, &(0x7f0000006000/0x4000)=nil, 0x0) r4 = syz_io_uring_setup(0x326, &(0x7f0000000000)={0x0, 0x11a, 0x80, 0x1, 0x24b}, &(0x7f0000000080), &(0x7f00000000c0)) r5 = syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0xaad8, 0x80, 0x3, 0x243, 0x0, r4}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x3cf2, &(0x7f0000000200)={0x0, 0xb873, 0xc, 0x2, 0xa, 0x0, r5}, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) syz_io_uring_setup(0x16b9, &(0x7f0000000300)={0x0, 0x1074, 0x200, 0x2, 0x1b1, 0x0, r4}, &(0x7f0000000380), &(0x7f00000003c0)) (async) syz_io_uring_setup(0x16b9, &(0x7f0000000300)={0x0, 0x1074, 0x200, 0x2, 0x1b1, 0x0, r4}, &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000400)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x6, 0x800, 0x0, 0x7, 0x0, 0x1}) r8 = syz_io_uring_setup(0x326, &(0x7f0000000000)={0x0, 0x11a, 0x80, 0x1, 0x24b}, &(0x7f0000000080), &(0x7f00000000c0)) r9 = syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0xaad8, 0x80, 0x3, 0x243, 0x0, r8}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x3cf2, &(0x7f0000000200)={0x0, 0xb873, 0xc, 0x2, 0xa, 0x0, r9}, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) syz_io_uring_setup(0x16b9, &(0x7f0000000300)={0x0, 0x1074, 0x200, 0x2, 0x1b1, 0x0, r8}, &(0x7f0000000380), &(0x7f00000003c0)) (async) syz_io_uring_setup(0x16b9, &(0x7f0000000300)={0x0, 0x1074, 0x200, 0x2, 0x1b1, 0x0, r8}, &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000400)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x6, 0x800, 0x0, 0x7, 0x0, 0x1}) syz_io_uring_submit(r6, r11, &(0x7f0000000300)=@IORING_OP_ACCEPT={0xd, 0x62, 0x0, r1, &(0x7f00000001c0)=0x80, &(0x7f0000000200)=@ieee802154={0x24, @long}, 0x0, 0x800, 0x1}) shmat(0x0, &(0x7f0000003000/0x1000)=nil, 0x2000) (async) r12 = shmat(0x0, &(0x7f0000003000/0x1000)=nil, 0x2000) shmget(0x2, 0xc000, 0x800, &(0x7f0000ff2000/0xc000)=nil) (async) shmget(0x2, 0xc000, 0x800, &(0x7f0000ff2000/0xc000)=nil) shmdt(r12) 08:48:22 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000040)=r1, 0x1) r2 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r2, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:22 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x40000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:22 executing program 3: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) accept4$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x800) r2 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000000000)=0x7f, 0x4) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x9c, 0x0, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4041}, 0xc005) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x9c, 0x0, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4041}, 0xc005) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) (async) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000540)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r7, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x28, r8, 0x711, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x28}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) r10 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) (async) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r10, 0x8933, &(0x7f0000000540)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r11, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x28, r12, 0x711, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}]}]}, 0x28}}, 0x0) r14 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r14, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r14, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r14, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r14, 0x8, '\x00', r15, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r14, 0x8, '\x00', r15, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$BATADV_CMD_SET_HARDIF(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r9}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7fff}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1f}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r13}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r15}]}, 0x64}}, 0x20000811) setsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000000c0), 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:22 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) accept4$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x800) socket(0x2a, 0x0, 0x0) (async) r2 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000000000)=0x7f, 0x4) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x9c, 0x0, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4041}, 0xc005) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) (async) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000540)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000540)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r7, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x28, r8, 0x711, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x28}}, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r10, 0x8933, &(0x7f0000000540)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r11, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x28, r12, 0x711, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}]}]}, 0x28}}, 0x0) (async) sendmsg$ETHTOOL_MSG_FEATURES_GET(r11, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x28, r12, 0x711, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}]}]}, 0x28}}, 0x0) r14 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r14, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r14, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r14, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r14, 0x8, '\x00', r15, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$BATADV_CMD_SET_HARDIF(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, 0x0, 0x2, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r9}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7fff}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x1f}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r13}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r15}]}, 0x64}}, 0x20000811) setsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000000c0), 0x0) (async) setsockopt$packet_buf(r5, 0x107, 0x6, &(0x7f00000000c0), 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:22 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x3f, 0x7f, 0xd4b7, 0x10001, 0x5, 0x7, 0x0, 0x7ffd}, &(0x7f0000000040)={0x6, 0x401, 0x0, 0x9, 0x3, 0x4, 0xfffffffffffff2ac, 0x100}, &(0x7f0000000080)={0x8, 0x8000000000b757, 0x80000000000000, 0x81, 0x8, 0xfffffffffffffffb, 0x4, 0x200009}, &(0x7f00000000c0)={r1, r2/1000+60000}) 08:48:22 executing program 0: r0 = shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) shmdt(r0) shmat(0xffffffffffffffff, &(0x7f0000003000/0x1000)=nil, 0x1000) r1 = socket$packet(0x11, 0x2, 0x300) shmat(0xffffffffffffffff, &(0x7f0000003000/0x2000)=nil, 0x6000) (async) shmat(0xffffffffffffffff, &(0x7f0000003000/0x2000)=nil, 0x6000) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) (async) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000008000/0x4000)=nil, 0xcd1, &(0x7f0000000280)='\xffb\x90mg\x02\x82D#\xa1\xb3\xc1\x91\xd1=:O\t\xb7\xd6\xe4R\xfaM\x9f.\x10\xa8\xb2y\xcb.\xfayU\b\xf4\x89\x03\xa8W6\x88c\x18R\xb8\xe3Z@\xf4\xd5\x8b i\xb655\x16p\xa6\x92i\xf33yX\xad\x7fa\x87u>\x8b\xe4\xf0#\xfe\"\xab\x9a\x11\xdd\xe9o') (async) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000008000/0x4000)=nil, 0xcd1, &(0x7f0000000280)='\xffb\x90mg\x02\x82D#\xa1\xb3\xc1\x91\xd1=:O\t\xb7\xd6\xe4R\xfaM\x9f.\x10\xa8\xb2y\xcb.\xfayU\b\xf4\x89\x03\xa8W6\x88c\x18R\xb8\xe3Z@\xf4\xd5\x8b i\xb655\x16p\xa6\x92i\xf33yX\xad\x7fa\x87u>\x8b\xe4\xf0#\xfe\"\xab\x9a\x11\xdd\xe9o') sendto$packet(r1, &(0x7f0000000000)="9d937ca002974cd73ed693b347837c04c1a24250ec1fbd50e9112ac9879757e6b09727ecc66ece1d8d0ad4711b7b45006c79d1dca886056acd8a1ccc5ae2f17134ded030ef4814e5e4d93f624a3fd562811db8606fa17acac15c437465d1ad2032b57f225d211a91a8db7c67353ffcf330586272b68923afcb26a2299bf5907f831400308d36624539bc1665285151f6eb1262e61716f4a2499c3c6574189a62fac517ad1e9bb5e3e01c6088ca8be91c8e7b4bbb2358b04b2e6a14fd2e88d0972a16ebc89f02eec919763f13ae6b89fc", 0xd0, 0x0, &(0x7f0000000180)={0x11, 0xc, r2, 0x1, 0x40}, 0x14) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = shmget$private(0x0, 0x1000, 0x800, &(0x7f0000ffc000/0x1000)=nil) shmat(r3, &(0x7f0000ffc000/0x1000)=nil, 0x6000) shmat(r3, &(0x7f0000006000/0x4000)=nil, 0x0) r4 = syz_io_uring_setup(0x326, &(0x7f0000000000)={0x0, 0x11a, 0x80, 0x1, 0x24b}, &(0x7f0000000080), &(0x7f00000000c0)) r5 = syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0xaad8, 0x80, 0x3, 0x243, 0x0, r4}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x3cf2, &(0x7f0000000200)={0x0, 0xb873, 0xc, 0x2, 0xa, 0x0, r5}, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) syz_io_uring_setup(0x16b9, &(0x7f0000000300)={0x0, 0x1074, 0x200, 0x2, 0x1b1, 0x0, r4}, &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000400)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x6, 0x800, 0x0, 0x7, 0x0, 0x1}) (async) syz_io_uring_submit(r6, r7, &(0x7f0000000400)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x6, 0x800, 0x0, 0x7, 0x0, 0x1}) syz_io_uring_setup(0x326, &(0x7f0000000000)={0x0, 0x11a, 0x80, 0x1, 0x24b}, &(0x7f0000000080), &(0x7f00000000c0)) (async) r8 = syz_io_uring_setup(0x326, &(0x7f0000000000)={0x0, 0x11a, 0x80, 0x1, 0x24b}, &(0x7f0000000080), &(0x7f00000000c0)) r9 = syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0xaad8, 0x80, 0x3, 0x243, 0x0, r8}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x3cf2, &(0x7f0000000200)={0x0, 0xb873, 0xc, 0x2, 0xa, 0x0, r9}, &(0x7f0000000280), &(0x7f00000002c0)) (async) syz_io_uring_setup(0x3cf2, &(0x7f0000000200)={0x0, 0xb873, 0xc, 0x2, 0xa, 0x0, r9}, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) syz_io_uring_setup(0x16b9, &(0x7f0000000300)={0x0, 0x1074, 0x200, 0x2, 0x1b1, 0x0, r8}, &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000400)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x6, 0x800, 0x0, 0x7, 0x0, 0x1}) syz_io_uring_submit(r6, r11, &(0x7f0000000300)=@IORING_OP_ACCEPT={0xd, 0x62, 0x0, r1, &(0x7f00000001c0)=0x80, &(0x7f0000000200)=@ieee802154={0x24, @long}, 0x0, 0x800, 0x1}) (async) syz_io_uring_submit(r6, r11, &(0x7f0000000300)=@IORING_OP_ACCEPT={0xd, 0x62, 0x0, r1, &(0x7f00000001c0)=0x80, &(0x7f0000000200)=@ieee802154={0x24, @long}, 0x0, 0x800, 0x1}) shmat(0x0, &(0x7f0000003000/0x1000)=nil, 0x2000) (async) r12 = shmat(0x0, &(0x7f0000003000/0x1000)=nil, 0x2000) shmget(0x2, 0xc000, 0x800, &(0x7f0000ff2000/0xc000)=nil) shmdt(r12) 08:48:22 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x47ee0000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:22 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:22 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r2, 0x8, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_COALESCE_RX_USECS_IRQ={0x8, 0x4, 0x9}, @ETHTOOL_A_COALESCE_TX_USECS={0x8, 0x6, 0x3}, @ETHTOOL_A_COALESCE_TX_USECS_IRQ={0x8, 0x8, 0x9}, @ETHTOOL_A_COALESCE_PKT_RATE_LOW={0x8, 0xd, 0x3}, @ETHTOOL_A_COALESCE_RX_USECS={0x8}, @ETHTOOL_A_COALESCE_RATE_SAMPLE_INTERVAL={0x8, 0x17, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000841}, 0x4000000) 08:48:22 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000800)=@req3={0x0, 0x6, 0x4, 0x7cd4f4c4, 0x2, 0x8001, 0x6}, 0x1c) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) recvfrom$packet(r2, &(0x7f0000000080)=""/31, 0x1f, 0x40012142, 0x0, 0x46) bind$l2tp6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0xfd10, @mcast2, 0x7f, 0x3}, 0x20) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000007c0)='/sys/module/cx231xx_alsa', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/keys\x00', 0x0, 0x0) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r2, 0x4, &(0x7f0000000940)=r8, 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000008c0)={&(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000000880)="4e65e0e0166e810170c4c0c2c42784b020a05e4d5ca04762d6c3b44657c4", 0x1e, r4}, 0x68) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000680), 0x88000, 0x0) io_submit(0x0, 0x6, &(0x7f0000000780)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x7fff, r2, &(0x7f00000001c0)="3ad58bc5c8021d264b93bdbf464a2102912f2df181ec80027600e12cc2ec1406b62b93323fe0c64cc71f06eae021689b8e5196f94d4ab510085a66cdcc13a4f997326fa67e3775d8555be4b77087fc32bb00c14c2c2964e910d43a1fa20e3209ccd72463592aa7ba73c194d69b23460ccd5c8b148d85cd7793baae324c6b7d77918dd9b06be9f834e88fedee38b769", 0x8f, 0xfffffffffffeffff, 0x0, 0x2, r3}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x3, r2, &(0x7f00000002c0)="d6c6e18a282b76b9e7ed14a37ebacff71d9fc46199556e394e4848e2a419105337b069", 0x23, 0x3, 0x0, 0x3, r4}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x8001, r1, &(0x7f0000000340)="efe175bc26902c01b24e7c03d216696affe251be48f666f7b354d24c57533c", 0x1f, 0xfff, 0x0, 0x0, r5}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x945, r2, &(0x7f00000003c0)="bedfa6281b51583c2c8d2ec780935427cc04c9c4fb63022d5f20823ddb92c08ffa2f767c32a14fd275725840065d337534e4b5bc542521717e41befbc0b09269796b432c2132c905e1addc89590041a90353b7a76c41480494ffc47d451acbbe2fb3ac35b7d34b0be9d7220c9e08a5c788e0a9645b0beb72fa97b85f9580213aa3df641a8a663dec6c9f0a10bb4b2b5e0f907398b37b8ef68e771751f72a23fe0f68c9787c7c989cc26a2d533caf1e0f735917fd0abe3185f6aa1486bd695242a2cce5e428c52922caf50ae682186c3eb93ac77f44716bdb259d266e986f7bd65346d69658ec842a", 0xe8, 0x1ff, 0x0, 0x3, r2}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0xa8e, r6, &(0x7f0000000500)="8d07681a891d8293222542d935518f1b915ec79db0337ea32571b33d0c7300abc1d51e7f6edb88b8af16c9f0a229daadc85b66bb8db4da7870f16beadae472496a922b5e95831ced6c056fca3d37efa30c5ca6f0954501b4fd574ffb01de740f7996328bdc38514c3b5dabe0cea735cb55d623e1c8658496d3e50cd10c4c983593c5b6e4b15245fb97d075e127ad50247315947941ef618f0c2143977111a8fd0df041b5352ea1ac07ea28988094fa5f0b6a48b48420e1f07dd7f472f32cdccc0b68908c2111b4ea76908f059133e0207ba0534f61600dd1", 0xd8, 0x5, 0x0, 0x2, r7}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x1ff, r9, &(0x7f00000006c0)="d6f6fb9d171fe92c0a8e6314f7d3dcd4cfac07dfb5001dbc67c2706fc3e3e52c4c9fb725c7bcd2a55d4694a32af51ae3132c6e5434a912bdb25d999c9958171a863c33209ed6995aabf1eaaae9f135c96a2d40654fc48e9a818256", 0x5b, 0x6, 0x0, 0x2}]) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000840)='\x00') r10 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x3, '\x00', 0x0, r10, 0x4, 0x5, 0x1}, 0x48) 08:48:22 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r2, 0x8, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_COALESCE_RX_USECS_IRQ={0x8, 0x4, 0x9}, @ETHTOOL_A_COALESCE_TX_USECS={0x8, 0x6, 0x3}, @ETHTOOL_A_COALESCE_TX_USECS_IRQ={0x8, 0x8, 0x9}, @ETHTOOL_A_COALESCE_PKT_RATE_LOW={0x8, 0xd, 0x3}, @ETHTOOL_A_COALESCE_RX_USECS={0x8}, @ETHTOOL_A_COALESCE_RATE_SAMPLE_INTERVAL={0x8, 0x17, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000841}, 0x4000000) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r2, 0x8, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_COALESCE_RX_USECS_IRQ={0x8, 0x4, 0x9}, @ETHTOOL_A_COALESCE_TX_USECS={0x8, 0x6, 0x3}, @ETHTOOL_A_COALESCE_TX_USECS_IRQ={0x8, 0x8, 0x9}, @ETHTOOL_A_COALESCE_PKT_RATE_LOW={0x8, 0xd, 0x3}, @ETHTOOL_A_COALESCE_RX_USECS={0x8}, @ETHTOOL_A_COALESCE_RATE_SAMPLE_INTERVAL={0x8, 0x17, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000841}, 0x4000000) (async) 08:48:22 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x87, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:22 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000800)=@req3={0x0, 0x6, 0x4, 0x7cd4f4c4, 0x2, 0x8001, 0x6}, 0x1c) (async) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) recvfrom$packet(r2, &(0x7f0000000080)=""/31, 0x1f, 0x40012142, 0x0, 0x46) (async) bind$l2tp6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0xfd10, @mcast2, 0x7f, 0x3}, 0x20) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000007c0)='/sys/module/cx231xx_alsa', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/keys\x00', 0x0, 0x0) (async) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r2, 0x4, &(0x7f0000000940)=r8, 0x1) (async) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000008c0)={&(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000000880)="4e65e0e0166e810170c4c0c2c42784b020a05e4d5ca04762d6c3b44657c4", 0x1e, r4}, 0x68) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000680), 0x88000, 0x0) io_submit(0x0, 0x6, &(0x7f0000000780)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x7fff, r2, &(0x7f00000001c0)="3ad58bc5c8021d264b93bdbf464a2102912f2df181ec80027600e12cc2ec1406b62b93323fe0c64cc71f06eae021689b8e5196f94d4ab510085a66cdcc13a4f997326fa67e3775d8555be4b77087fc32bb00c14c2c2964e910d43a1fa20e3209ccd72463592aa7ba73c194d69b23460ccd5c8b148d85cd7793baae324c6b7d77918dd9b06be9f834e88fedee38b769", 0x8f, 0xfffffffffffeffff, 0x0, 0x2, r3}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x3, r2, &(0x7f00000002c0)="d6c6e18a282b76b9e7ed14a37ebacff71d9fc46199556e394e4848e2a419105337b069", 0x23, 0x3, 0x0, 0x3, r4}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x8001, r1, &(0x7f0000000340)="efe175bc26902c01b24e7c03d216696affe251be48f666f7b354d24c57533c", 0x1f, 0xfff, 0x0, 0x0, r5}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x945, r2, &(0x7f00000003c0)="bedfa6281b51583c2c8d2ec780935427cc04c9c4fb63022d5f20823ddb92c08ffa2f767c32a14fd275725840065d337534e4b5bc542521717e41befbc0b09269796b432c2132c905e1addc89590041a90353b7a76c41480494ffc47d451acbbe2fb3ac35b7d34b0be9d7220c9e08a5c788e0a9645b0beb72fa97b85f9580213aa3df641a8a663dec6c9f0a10bb4b2b5e0f907398b37b8ef68e771751f72a23fe0f68c9787c7c989cc26a2d533caf1e0f735917fd0abe3185f6aa1486bd695242a2cce5e428c52922caf50ae682186c3eb93ac77f44716bdb259d266e986f7bd65346d69658ec842a", 0xe8, 0x1ff, 0x0, 0x3, r2}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0xa8e, r6, &(0x7f0000000500)="8d07681a891d8293222542d935518f1b915ec79db0337ea32571b33d0c7300abc1d51e7f6edb88b8af16c9f0a229daadc85b66bb8db4da7870f16beadae472496a922b5e95831ced6c056fca3d37efa30c5ca6f0954501b4fd574ffb01de740f7996328bdc38514c3b5dabe0cea735cb55d623e1c8658496d3e50cd10c4c983593c5b6e4b15245fb97d075e127ad50247315947941ef618f0c2143977111a8fd0df041b5352ea1ac07ea28988094fa5f0b6a48b48420e1f07dd7f472f32cdccc0b68908c2111b4ea76908f059133e0207ba0534f61600dd1", 0xd8, 0x5, 0x0, 0x2, r7}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x1ff, r9, &(0x7f00000006c0)="d6f6fb9d171fe92c0a8e6314f7d3dcd4cfac07dfb5001dbc67c2706fc3e3e52c4c9fb725c7bcd2a55d4694a32af51ae3132c6e5434a912bdb25d999c9958171a863c33209ed6995aabf1eaaae9f135c96a2d40654fc48e9a818256", 0x5b, 0x6, 0x0, 0x2}]) (async) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000840)='\x00') r10 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x3, '\x00', 0x0, r10, 0x4, 0x5, 0x1}, 0x48) 08:48:22 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x87000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:22 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x3f, 0x7f, 0xd4b7, 0x10001, 0x5, 0x7, 0x0, 0x7ffd}, &(0x7f0000000040)={0x6, 0x401, 0x0, 0x9, 0x3, 0x4, 0xfffffffffffff2ac, 0x100}, &(0x7f0000000080)={0x8, 0x8000000000b757, 0x80000000000000, 0x81, 0x8, 0xfffffffffffffffb, 0x4, 0x200009}, &(0x7f00000000c0)={r1, r2/1000+60000}) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000100)) (async) select(0x40, &(0x7f0000000000)={0x3f, 0x7f, 0xd4b7, 0x10001, 0x5, 0x7, 0x0, 0x7ffd}, &(0x7f0000000040)={0x6, 0x401, 0x0, 0x9, 0x3, 0x4, 0xfffffffffffff2ac, 0x100}, &(0x7f0000000080)={0x8, 0x8000000000b757, 0x80000000000000, 0x81, 0x8, 0xfffffffffffffffb, 0x4, 0x200009}, &(0x7f00000000c0)={r1, r2/1000+60000}) (async) 08:48:22 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x700}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:22 executing program 0: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000800)=@req3={0x0, 0x6, 0x4, 0x7cd4f4c4, 0x2, 0x8001, 0x6}, 0x1c) (async) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000800)=@req3={0x0, 0x6, 0x4, 0x7cd4f4c4, 0x2, 0x8001, 0x6}, 0x1c) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) recvfrom$packet(r2, &(0x7f0000000080)=""/31, 0x1f, 0x40012142, 0x0, 0x46) (async) recvfrom$packet(r2, &(0x7f0000000080)=""/31, 0x1f, 0x40012142, 0x0, 0x46) bind$l2tp6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0xfd10, @mcast2, 0x7f, 0x3}, 0x20) openat$sysfs(0xffffffffffffff9c, &(0x7f00000007c0)='/sys/module/cx231xx_alsa', 0x0, 0x0) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000007c0)='/sys/module/cx231xx_alsa', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/keys\x00', 0x0, 0x0) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r2, 0x4, &(0x7f0000000940)=r8, 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000008c0)={&(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000000880)="4e65e0e0166e810170c4c0c2c42784b020a05e4d5ca04762d6c3b44657c4", 0x1e, r4}, 0x68) (async) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000008c0)={&(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000000880)="4e65e0e0166e810170c4c0c2c42784b020a05e4d5ca04762d6c3b44657c4", 0x1e, r4}, 0x68) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000680), 0x88000, 0x0) io_submit(0x0, 0x6, &(0x7f0000000780)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x7fff, r2, &(0x7f00000001c0)="3ad58bc5c8021d264b93bdbf464a2102912f2df181ec80027600e12cc2ec1406b62b93323fe0c64cc71f06eae021689b8e5196f94d4ab510085a66cdcc13a4f997326fa67e3775d8555be4b77087fc32bb00c14c2c2964e910d43a1fa20e3209ccd72463592aa7ba73c194d69b23460ccd5c8b148d85cd7793baae324c6b7d77918dd9b06be9f834e88fedee38b769", 0x8f, 0xfffffffffffeffff, 0x0, 0x2, r3}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x3, r2, &(0x7f00000002c0)="d6c6e18a282b76b9e7ed14a37ebacff71d9fc46199556e394e4848e2a419105337b069", 0x23, 0x3, 0x0, 0x3, r4}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x8001, r1, &(0x7f0000000340)="efe175bc26902c01b24e7c03d216696affe251be48f666f7b354d24c57533c", 0x1f, 0xfff, 0x0, 0x0, r5}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x945, r2, &(0x7f00000003c0)="bedfa6281b51583c2c8d2ec780935427cc04c9c4fb63022d5f20823ddb92c08ffa2f767c32a14fd275725840065d337534e4b5bc542521717e41befbc0b09269796b432c2132c905e1addc89590041a90353b7a76c41480494ffc47d451acbbe2fb3ac35b7d34b0be9d7220c9e08a5c788e0a9645b0beb72fa97b85f9580213aa3df641a8a663dec6c9f0a10bb4b2b5e0f907398b37b8ef68e771751f72a23fe0f68c9787c7c989cc26a2d533caf1e0f735917fd0abe3185f6aa1486bd695242a2cce5e428c52922caf50ae682186c3eb93ac77f44716bdb259d266e986f7bd65346d69658ec842a", 0xe8, 0x1ff, 0x0, 0x3, r2}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0xa8e, r6, &(0x7f0000000500)="8d07681a891d8293222542d935518f1b915ec79db0337ea32571b33d0c7300abc1d51e7f6edb88b8af16c9f0a229daadc85b66bb8db4da7870f16beadae472496a922b5e95831ced6c056fca3d37efa30c5ca6f0954501b4fd574ffb01de740f7996328bdc38514c3b5dabe0cea735cb55d623e1c8658496d3e50cd10c4c983593c5b6e4b15245fb97d075e127ad50247315947941ef618f0c2143977111a8fd0df041b5352ea1ac07ea28988094fa5f0b6a48b48420e1f07dd7f472f32cdccc0b68908c2111b4ea76908f059133e0207ba0534f61600dd1", 0xd8, 0x5, 0x0, 0x2, r7}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x1ff, r9, &(0x7f00000006c0)="d6f6fb9d171fe92c0a8e6314f7d3dcd4cfac07dfb5001dbc67c2706fc3e3e52c4c9fb725c7bcd2a55d4694a32af51ae3132c6e5434a912bdb25d999c9958171a863c33209ed6995aabf1eaaae9f135c96a2d40654fc48e9a818256", 0x5b, 0x6, 0x0, 0x2}]) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000840)='\x00') r10 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/timer_list\x00', 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x3, '\x00', 0x0, r10, 0x4, 0x5, 0x1}, 0x48) 08:48:22 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x100000d, 0x110, r0, 0x906db000) r1 = syz_io_uring_setup(0x1d79, &(0x7f0000000000)={0x0, 0xc5cb, 0x0, 0x1, 0x87}, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000001, 0x100010, r1, 0x10000000) r2 = socket$packet(0x11, 0x2, 0x300) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r3, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004800}, 0x20000004) recvfrom$packet(r2, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000712000/0x2000)=nil, &(0x7f000056b000/0x3000)=nil, &(0x7f0000a00000/0x2000)=nil, &(0x7f0000b77000/0x2000)=nil, &(0x7f00006db000/0x3000)=nil, &(0x7f000054d000/0x3000)=nil, &(0x7f0000ff3000/0xc000)=nil, &(0x7f0000455000/0x2000)=nil, &(0x7f0000000100)="b4ddf6b6a06d67247703dd753fbcb716ab2b1907db78e9a79b8a5e373fd6747e9d2ab4ea852bca845120b2272005632d23e1e54d9305e3db70bc9280dea5ff43e6a48952ccf8bca51dd4608da5cf564f81d0c368f0b42c119675d7ce0ba6b8617d249624021d4619bf93aee5398edf9bd16ef571e9b97f49347c3cb6e241927d6a4c155d361f7e461eb5695817845dc708da81c9a181ad83509510948fb4b8c5a90ca43dee53904b495ab1c77072fbd4e2aa08b3aaa6815e7abd65859b0aa3dbd099497582e5beaad1f6b97f76099478a4ccc3f9758691001b183d8c", 0xdc, r4}, 0x68) 08:48:23 executing program 3: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x3f, 0x7f, 0xd4b7, 0x10001, 0x5, 0x7, 0x0, 0x7ffd}, &(0x7f0000000040)={0x6, 0x401, 0x0, 0x9, 0x3, 0x4, 0xfffffffffffff2ac, 0x100}, &(0x7f0000000080)={0x8, 0x8000000000b757, 0x80000000000000, 0x81, 0x8, 0xfffffffffffffffb, 0x4, 0x200009}, &(0x7f00000000c0)={r1, r2/1000+60000}) 08:48:23 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:23 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r2, 0x8, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_COALESCE_RX_USECS_IRQ={0x8, 0x4, 0x9}, @ETHTOOL_A_COALESCE_TX_USECS={0x8, 0x6, 0x3}, @ETHTOOL_A_COALESCE_TX_USECS_IRQ={0x8, 0x8, 0x9}, @ETHTOOL_A_COALESCE_PKT_RATE_LOW={0x8, 0xd, 0x3}, @ETHTOOL_A_COALESCE_RX_USECS={0x8}, @ETHTOOL_A_COALESCE_RATE_SAMPLE_INTERVAL={0x8, 0x17, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000841}, 0x4000000) 08:48:23 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) getpeername$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:23 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0xffff0000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:23 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) getpeername$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) (async) getpeername$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:23 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x100000d, 0x110, r0, 0x906db000) (async) r1 = syz_io_uring_setup(0x1d79, &(0x7f0000000000)={0x0, 0xc5cb, 0x0, 0x1, 0x87}, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000001, 0x100010, r1, 0x10000000) r2 = socket$packet(0x11, 0x2, 0x300) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r3, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004800}, 0x20000004) recvfrom$packet(r2, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000712000/0x2000)=nil, &(0x7f000056b000/0x3000)=nil, &(0x7f0000a00000/0x2000)=nil, &(0x7f0000b77000/0x2000)=nil, &(0x7f00006db000/0x3000)=nil, &(0x7f000054d000/0x3000)=nil, &(0x7f0000ff3000/0xc000)=nil, &(0x7f0000455000/0x2000)=nil, &(0x7f0000000100)="b4ddf6b6a06d67247703dd753fbcb716ab2b1907db78e9a79b8a5e373fd6747e9d2ab4ea852bca845120b2272005632d23e1e54d9305e3db70bc9280dea5ff43e6a48952ccf8bca51dd4608da5cf564f81d0c368f0b42c119675d7ce0ba6b8617d249624021d4619bf93aee5398edf9bd16ef571e9b97f49347c3cb6e241927d6a4c155d361f7e461eb5695817845dc708da81c9a181ad83509510948fb4b8c5a90ca43dee53904b495ab1c77072fbd4e2aa08b3aaa6815e7abd65859b0aa3dbd099497582e5beaad1f6b97f76099478a4ccc3f9758691001b183d8c", 0xdc, r4}, 0x68) 08:48:23 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x500, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:23 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:23 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x810}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:23 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x100000d, 0x110, r0, 0x906db000) (async, rerun: 32) r1 = syz_io_uring_setup(0x1d79, &(0x7f0000000000)={0x0, 0xc5cb, 0x0, 0x1, 0x87}, &(0x7f0000000080), &(0x7f00000000c0)) (rerun: 32) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000001, 0x100010, r1, 0x10000000) r2 = socket$packet(0x11, 0x2, 0x300) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r3, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x4}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004800}, 0x20000004) (async) recvfrom$packet(r2, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async, rerun: 32) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (rerun: 32) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000712000/0x2000)=nil, &(0x7f000056b000/0x3000)=nil, &(0x7f0000a00000/0x2000)=nil, &(0x7f0000b77000/0x2000)=nil, &(0x7f00006db000/0x3000)=nil, &(0x7f000054d000/0x3000)=nil, &(0x7f0000ff3000/0xc000)=nil, &(0x7f0000455000/0x2000)=nil, &(0x7f0000000100)="b4ddf6b6a06d67247703dd753fbcb716ab2b1907db78e9a79b8a5e373fd6747e9d2ab4ea852bca845120b2272005632d23e1e54d9305e3db70bc9280dea5ff43e6a48952ccf8bca51dd4608da5cf564f81d0c368f0b42c119675d7ce0ba6b8617d249624021d4619bf93aee5398edf9bd16ef571e9b97f49347c3cb6e241927d6a4c155d361f7e461eb5695817845dc708da81c9a181ad83509510948fb4b8c5a90ca43dee53904b495ab1c77072fbd4e2aa08b3aaa6815e7abd65859b0aa3dbd099497582e5beaad1f6b97f76099478a4ccc3f9758691001b183d8c", 0xdc, r4}, 0x68) 08:48:23 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) getpeername$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:23 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x600, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:23 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:23 executing program 3: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_io_uring_setup(0x326, &(0x7f0000000000)={0x0, 0x11a, 0x80, 0x1, 0x24b}, &(0x7f0000000080), &(0x7f00000000c0)) r2 = syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0xaad8, 0x80, 0x3, 0x243, 0x0, r1}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x3cf2, &(0x7f0000000200)={0x0, 0xb873, 0xc, 0x2, 0xa, 0x0, r2}, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) syz_io_uring_setup(0x16b9, &(0x7f0000000300)={0x0, 0x1074, 0x200, 0x2, 0x1b1, 0x0, r1}, &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000400)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x6, 0x800, 0x0, 0x7, 0x0, 0x1}) syz_io_uring_submit(0x0, r4, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, {0x4000}}) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:23 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:23 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x810, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:24 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x80, 0x40, 0x8, 0x3ff, {{0xc, 0x4, 0x3, 0x1, 0x30, 0x64, 0x0, 0x7f, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_prespec={0x44, 0x1c, 0xe6, 0x3, 0x9, [{@multicast2, 0x1ff}, {@remote, 0xfffffffe}, {@loopback, 0x1}]}]}}}}}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001180)={0x14, r4, 0x101}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, r4, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x80000000}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xfffffbff}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x4000060) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r5, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x20}, @ETHTOOL_A_LINKINFO_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x81}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) setsockopt$packet_int(r8, 0x107, 0x3, &(0x7f0000000200)=0x4e4, 0x4) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, 0x0, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x4000010) 08:48:24 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:24 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x1008, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:24 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x80, 0x40, 0x8, 0x3ff, {{0xc, 0x4, 0x3, 0x1, 0x30, 0x64, 0x0, 0x7f, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_prespec={0x44, 0x1c, 0xe6, 0x3, 0x9, [{@multicast2, 0x1ff}, {@remote, 0xfffffffe}, {@loopback, 0x1}]}]}}}}}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001180)={0x14, r4, 0x101}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, r4, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x80000000}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xfffffbff}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x4000060) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r5, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x20}, @ETHTOOL_A_LINKINFO_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x81}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) setsockopt$packet_int(r8, 0x107, 0x3, &(0x7f0000000200)=0x4e4, 0x4) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, 0x0, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x4000010) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x80, 0x40, 0x8, 0x3ff, {{0xc, 0x4, 0x3, 0x1, 0x30, 0x64, 0x0, 0x7f, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_prespec={0x44, 0x1c, 0xe6, 0x3, 0x9, [{@multicast2, 0x1ff}, {@remote, 0xfffffffe}, {@loopback, 0x1}]}]}}}}}) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001180)={0x14, r4, 0x101}, 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, r4, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x80000000}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xfffffbff}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x4000060) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r5, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x20}, @ETHTOOL_A_LINKINFO_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x81}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x80) (async) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) (async) setsockopt$packet_int(r8, 0x107, 0x3, &(0x7f0000000200)=0x4e4, 0x4) (async) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, 0x0, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x4000010) (async) 08:48:24 executing program 0: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x80, 0x40, 0x8, 0x3ff, {{0xc, 0x4, 0x3, 0x1, 0x30, 0x64, 0x0, 0x7f, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_prespec={0x44, 0x1c, 0xe6, 0x3, 0x9, [{@multicast2, 0x1ff}, {@remote, 0xfffffffe}, {@loopback, 0x1}]}]}}}}}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001180)={0x14, r4, 0x101}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, r4, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x80000000}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xfffffbff}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x4000060) (async) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, r4, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x80000000}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xfffffbff}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x4000060) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r5, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x20}, @ETHTOOL_A_LINKINFO_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x81}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x80) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) (async) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) setsockopt$packet_int(r8, 0x107, 0x3, &(0x7f0000000200)=0x4e4, 0x4) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, 0x0, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x4000010) (async) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, 0x0, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x4000010) 08:48:24 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:24 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x4000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:24 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000040)=""/57, 0x39, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) 08:48:24 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x1008}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:24 executing program 3: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_setup(0x326, &(0x7f0000000000)={0x0, 0x11a, 0x80, 0x1, 0x24b}, &(0x7f0000000080), &(0x7f00000000c0)) (async) r1 = syz_io_uring_setup(0x326, &(0x7f0000000000)={0x0, 0x11a, 0x80, 0x1, 0x24b}, &(0x7f0000000080), &(0x7f00000000c0)) r2 = syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0xaad8, 0x80, 0x3, 0x243, 0x0, r1}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x3cf2, &(0x7f0000000200)={0x0, 0xb873, 0xc, 0x2, 0xa, 0x0, r2}, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) syz_io_uring_setup(0x16b9, &(0x7f0000000300)={0x0, 0x1074, 0x200, 0x2, 0x1b1, 0x0, r1}, &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000400)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x6, 0x800, 0x0, 0x7, 0x0, 0x1}) syz_io_uring_submit(0x0, r4, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, {0x4000}}) (async) syz_io_uring_submit(0x0, r4, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, {0x4000}}) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:24 executing program 3: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_setup(0x326, &(0x7f0000000000)={0x0, 0x11a, 0x80, 0x1, 0x24b}, &(0x7f0000000080), &(0x7f00000000c0)) (async) r1 = syz_io_uring_setup(0x326, &(0x7f0000000000)={0x0, 0x11a, 0x80, 0x1, 0x24b}, &(0x7f0000000080), &(0x7f00000000c0)) r2 = syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0xaad8, 0x80, 0x3, 0x243, 0x0, r1}, &(0x7f0000000180), &(0x7f00000001c0)) syz_io_uring_setup(0x3cf2, &(0x7f0000000200)={0x0, 0xb873, 0xc, 0x2, 0xa, 0x0, r2}, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) syz_io_uring_setup(0x16b9, &(0x7f0000000300)={0x0, 0x1074, 0x200, 0x2, 0x1b1, 0x0, r1}, &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000400)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x6, 0x800, 0x0, 0x7, 0x0, 0x1}) syz_io_uring_submit(0x0, r4, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, {0x4000}}) (async) syz_io_uring_submit(0x0, r4, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, {0x4000}}) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:24 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/orinoco', 0xaca00, 0xf9) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/178, 0xb2, 0x1, &(0x7f0000000200)=""/78, 0x4e}, &(0x7f00000002c0)=0x40) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x800) getsockname$packet(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 08:48:24 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:24 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x47ee, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:24 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x8700, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:24 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:25 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0xee47, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:25 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x810000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:25 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:25 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000040)=""/57, 0x39, 0x2, 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) 08:48:25 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x4000}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:25 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/orinoco', 0xaca00, 0xf9) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/178, 0xb2, 0x1, &(0x7f0000000200)=""/78, 0x4e}, &(0x7f00000002c0)=0x40) (async) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r2 = accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x800) getsockname$packet(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 08:48:25 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x800000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:25 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000040)=""/57, 0x39, 0x2, 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) 08:48:25 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x47ee000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:25 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) write$qrtrtun(r1, &(0x7f0000000240)="987ac178a1f9998d0a2bf9bd09d5d5c7f67e9b36f734e22787b37e84390ff115811eb8ad7175f355f00c2d25ac61b27083ce45192ca1ad3ddd5b26f62a2084deafb2f5153147fbed0c317fd447670bd2e567344964469c54857a43d0acf3c206d4a85a31ddabb15c088768ea562c8c8b3191371c30a3be0e7eab6c31ec79fa8491d451b1555e61abf0dba25dbbefdc0f9f6459eab9df6c4d827f677fb7957760ae286bf8092aa2a4cb8556734ffc883701630eb74bc305196ca47ca48df9a67ae4781ea80fbd2fa4d79c695600154f41e1a7", 0xd2) r2 = socket(0x2a, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r3) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00022cbd7000ffdbdf2508000000060001000400000014001f00fc02000000000000000000000000000105000400ba00000005000d00000000000c000f00fffffffffeffffff06000300030000000500120081000000"], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000003c0)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1100000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000400)={0x198, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x8002}, 0x4040) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r11, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r11) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) connect$l2tp6(r12, &(0x7f0000000200)={0xa, 0x0, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80000000, 0x4}, 0x20) r13 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r13, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$PPPIOCSMRU(r13, 0x40047452, &(0x7f0000000340)=0x2) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:25 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) write$qrtrtun(r1, &(0x7f0000000240)="987ac178a1f9998d0a2bf9bd09d5d5c7f67e9b36f734e22787b37e84390ff115811eb8ad7175f355f00c2d25ac61b27083ce45192ca1ad3ddd5b26f62a2084deafb2f5153147fbed0c317fd447670bd2e567344964469c54857a43d0acf3c206d4a85a31ddabb15c088768ea562c8c8b3191371c30a3be0e7eab6c31ec79fa8491d451b1555e61abf0dba25dbbefdc0f9f6459eab9df6c4d827f677fb7957760ae286bf8092aa2a4cb8556734ffc883701630eb74bc305196ca47ca48df9a67ae4781ea80fbd2fa4d79c695600154f41e1a7", 0xd2) (async) r2 = socket(0x2a, 0x0, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r3) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00022cbd7000ffdbdf2508000000060001000400000014001f00fc02000000000000000000000000000105000400ba00000005000d00000000000c000f00fffffffffeffffff06000300030000000500120081000000"], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000003c0)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1100000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000400)={0x198, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x8002}, 0x4040) (async) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r11, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r11) (async) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) connect$l2tp6(r12, &(0x7f0000000200)={0xa, 0x0, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80000000, 0x4}, 0x20) r13 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r13, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$PPPIOCSMRU(r13, 0x40047452, &(0x7f0000000340)=0x2) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:25 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) write$qrtrtun(r1, &(0x7f0000000240)="987ac178a1f9998d0a2bf9bd09d5d5c7f67e9b36f734e22787b37e84390ff115811eb8ad7175f355f00c2d25ac61b27083ce45192ca1ad3ddd5b26f62a2084deafb2f5153147fbed0c317fd447670bd2e567344964469c54857a43d0acf3c206d4a85a31ddabb15c088768ea562c8c8b3191371c30a3be0e7eab6c31ec79fa8491d451b1555e61abf0dba25dbbefdc0f9f6459eab9df6c4d827f677fb7957760ae286bf8092aa2a4cb8556734ffc883701630eb74bc305196ca47ca48df9a67ae4781ea80fbd2fa4d79c695600154f41e1a7", 0xd2) r2 = socket(0x2a, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r3) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00022cbd7000ffdbdf2508000000060001000400000014001f00fc02000000000000000000000000000105000400ba00000005000d00000000000c000f00fffffffffeffffff06000300030000000500120081000000"], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) (async) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00022cbd7000ffdbdf2508000000060001000400000014001f00fc02000000000000000000000000000105000400ba00000005000d00000000000c000f00fffffffffeffffff06000300030000000500120081000000"], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f00000003c0)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1100000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000400)={0x198, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x8002}, 0x4040) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r11 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r11, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), r11) pipe2$watch_queue(&(0x7f00000001c0), 0x80) (async) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) connect$l2tp6(r12, &(0x7f0000000200)={0xa, 0x0, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80000000, 0x4}, 0x20) (async) connect$l2tp6(r12, &(0x7f0000000200)={0xa, 0x0, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x80000000, 0x4}, 0x20) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r13 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r13, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$PPPIOCSMRU(r13, 0x40047452, &(0x7f0000000340)=0x2) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:25 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x7, 0x12) 08:48:25 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x25, 0x800, 0x2) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x300, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7600}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x97}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000004}, 0x20004810) socket$xdp(0x2c, 0x3, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/63, 0x3f, 0x1, &(0x7f0000002580)=""/4093, 0xffd}, &(0x7f0000000080)=0x40) 08:48:25 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x7, 0x12) socket$packet(0x11, 0x2, 0x300) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) read$eventfd(r0, &(0x7f0000000000), 0x8) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) (async) write$cgroup_int(r1, &(0x7f0000000040)=0x7, 0x12) (async) 08:48:25 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket(0x25, 0x800, 0x2) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x300, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7600}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x97}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000004}, 0x20004810) (async) socket$xdp(0x2c, 0x3, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/63, 0x3f, 0x1, &(0x7f0000002580)=""/4093, 0xffd}, &(0x7f0000000080)=0x40) 08:48:26 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x25, 0x800, 0x2) (async) r1 = socket(0x25, 0x800, 0x2) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x300, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x7600}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x7}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x97}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000004}, 0x20004810) socket$xdp(0x2c, 0x3, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/63, 0x3f, 0x1, &(0x7f0000002580)=""/4093, 0xffd}, &(0x7f0000000080)=0x40) (async) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/63, 0x3f, 0x1, &(0x7f0000002580)=""/4093, 0xffd}, &(0x7f0000000080)=0x40) 08:48:26 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) read$eventfd(r0, &(0x7f0000000000), 0x8) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) (async) write$cgroup_int(r1, &(0x7f0000000040)=0x7, 0x12) 08:48:26 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x8700000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:26 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x1000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:26 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x8700}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:26 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/orinoco', 0xaca00, 0xf9) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/178, 0xb2, 0x1, &(0x7f0000000200)=""/78, 0x4e}, &(0x7f00000002c0)=0x40) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x800) getsockname$packet(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x14) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/orinoco', 0xaca00, 0xf9) (async) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/178, 0xb2, 0x1, &(0x7f0000000200)=""/78, 0x4e}, &(0x7f00000002c0)=0x40) (async) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x800) (async) getsockname$packet(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x14) (async) 08:48:26 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) recvfrom$packet(r1, &(0x7f0000000000)=""/86, 0x56, 0x40, &(0x7f0000000100)={0x11, 0xe1, r2, 0x1, 0x2b, 0x6, @multicast}, 0x14) 08:48:26 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/btusb', 0x0, 0x41) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(r1, &(0x7f0000000040)='hugetlb.2MB.rsvd.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:26 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x40000142, 0x0, 0x0) 08:48:26 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0xffff000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:26 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x2000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:26 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x40000142, 0x0, 0x0) 08:48:26 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x40000142, 0x0, 0x0) 08:48:26 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/197, 0xc5, 0x20, &(0x7f0000000180)={0x11, 0x1c, r1, 0x1, 0x90, 0x6, @local}, 0x14) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r4, 0x300, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8080}, 0x0) 08:48:26 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/197, 0xc5, 0x20, &(0x7f0000000180)={0x11, 0x1c, r1, 0x1, 0x90, 0x6, @local}, 0x14) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r4, 0x300, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8080}, 0x0) socket$packet(0x11, 0x2, 0x300) (async) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) (async) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/197, 0xc5, 0x20, &(0x7f0000000180)={0x11, 0x1c, r1, 0x1, 0x90, 0x6, @local}, 0x14) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) (async) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r4, 0x300, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8080}, 0x0) (async) 08:48:26 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/197, 0xc5, 0x20, &(0x7f0000000180)={0x11, 0x1c, r1, 0x1, 0x90, 0x6, @local}, 0x14) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r4, 0x300, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8080}, 0x0) (async) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r4, 0x300, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8080}, 0x0) 08:48:27 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0xeffd}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:27 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:27 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x3000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:27 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:27 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/btusb', 0x0, 0x41) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(r1, &(0x7f0000000040)='hugetlb.2MB.rsvd.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000000040)='hugetlb.2MB.rsvd.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) recvfrom$packet(r1, &(0x7f0000000000)=""/86, 0x56, 0x40, &(0x7f0000000100)={0x11, 0xe1, r2, 0x1, 0x2b, 0x6, @multicast}, 0x14) 08:48:27 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x4000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:27 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/btusb', 0x0, 0x41) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(r1, &(0x7f0000000040)='hugetlb.2MB.rsvd.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) (async) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) recvfrom$packet(r1, &(0x7f0000000000)=""/86, 0x56, 0x40, &(0x7f0000000100)={0x11, 0xe1, r2, 0x1, 0x2b, 0x6, @multicast}, 0x14) 08:48:27 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:27 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x5000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:27 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) [ 1068.562851][T15938] ================================================================== [ 1068.570938][T15938] BUG: KCSAN: data-race in delete_from_page_cache_batch / folio_mapping [ 1068.579247][T15938] [ 1068.581551][T15938] write to 0xffffea00041c8cd8 of 8 bytes by task 8 on cpu 0: [ 1068.588895][T15938] delete_from_page_cache_batch+0x32a/0x710 [ 1068.594769][T15938] truncate_inode_pages_range+0x1bd/0x6a0 [ 1068.600469][T15938] truncate_setsize+0x8e/0xb0 [ 1068.605125][T15938] aio_free_ring+0x4d/0x2a0 [ 1068.609611][T15938] free_ioctx+0x1b/0x60 [ 1068.613750][T15938] process_scheduled_works+0x5b8/0xa30 [ 1068.619190][T15938] worker_thread+0x525/0x730 [ 1068.623760][T15938] kthread+0x1d7/0x210 [ 1068.627811][T15938] ret_from_fork+0x48/0x60 [ 1068.632209][T15938] ret_from_fork_asm+0x11/0x20 [ 1068.636954][T15938] [ 1068.639258][T15938] read to 0xffffea00041c8cd8 of 8 bytes by task 15938 on cpu 1: [ 1068.646864][T15938] folio_mapping+0x92/0x110 [ 1068.651348][T15938] lru_add_fn+0x8d/0x440 [ 1068.655578][T15938] folio_batch_move_lru+0x21e/0x2f0 [ 1068.660758][T15938] lru_add_drain_cpu+0x77/0x270 [ 1068.665590][T15938] lru_add_drain+0x34/0x80 [ 1068.670028][T15938] exit_mmap+0x135/0x640 [ 1068.674252][T15938] __mmput+0x28/0x1c0 [ 1068.678219][T15938] mmput+0x4c/0x60 [ 1068.681922][T15938] exit_mm+0xe3/0x180 [ 1068.685887][T15938] do_exit+0x585/0x16d0 [ 1068.690041][T15938] do_group_exit+0x101/0x150 [ 1068.694613][T15938] get_signal+0xf4e/0x10a0 [ 1068.699012][T15938] arch_do_signal_or_restart+0x95/0x4b0 [ 1068.704535][T15938] exit_to_user_mode_loop+0x6f/0xe0 [ 1068.709711][T15938] exit_to_user_mode_prepare+0x6c/0xb0 [ 1068.715156][T15938] syscall_exit_to_user_mode+0x26/0x140 [ 1068.720680][T15938] do_syscall_64+0x50/0x110 [ 1068.725169][T15938] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1068.731049][T15938] [ 1068.733352][T15938] value changed: 0xffff88812acd9288 -> 0x0000000000000000 [ 1068.740434][T15938] [ 1068.742745][T15938] Reported by Kernel Concurrency Sanitizer on: [ 1068.748876][T15938] CPU: 1 PID: 15938 Comm: syz-executor.5 Not tainted 6.7.0-rc7-syzkaller-00003-gfbafc3e621c3 #0 [ 1068.759267][T15938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 1068.769300][T15938] ================================================================== 08:48:28 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:28 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x6000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:28 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpu.weight.nice\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000000300)='cpuset.cpus\x00', 0x2, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/vrf', 0x40480, 0x80) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000003c0)={'batadv_slave_0\x00'}) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000340)=0xc410040) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$TFD_IOC_SET_TICKS(r7, 0x40085400, &(0x7f0000000380)=0x7f) write$cgroup_int(r5, &(0x7f00000000c0)=0x7, 0x12) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000200)={'erspan0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x80, 0x0, 0x2, 0x5, {{0x14, 0x4, 0x1, 0x0, 0x50, 0x65, 0x0, 0x21, 0x29, 0x0, @private=0xa010101, @broadcast, {[@noop, @timestamp_prespec={0x44, 0xc, 0x99, 0x3, 0x3, [{@loopback, 0x4}]}, @rr={0x7, 0x7, 0x49, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @rr={0x7, 0xb, 0xe4, [@loopback, @loopback, @multicast2, @broadcast, @loopback, @rand_addr=0x64010102]}, @lsrr={0x83, 0xb, 0xfb, [@empty, @local]}]}}}}}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r8, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10001}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xfffff000}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r9}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x6000000) 08:48:28 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000000)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:28 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0xfcfd}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/hackrf', 0x100, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x1, &(0x7f0000000140)=""/228, 0xe4}, &(0x7f0000000280)=0x40) recvfrom$packet(r0, &(0x7f0000000000)=""/18, 0x12, 0x0, &(0x7f0000000040)={0x11, 0x4, r2, 0x1, 0x81, 0x6, @random="0070f7672562"}, 0x14) 08:48:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/hackrf', 0x100, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x1, &(0x7f0000000140)=""/228, 0xe4}, &(0x7f0000000280)=0x40) (async, rerun: 32) recvfrom$packet(r0, &(0x7f0000000000)=""/18, 0x12, 0x0, &(0x7f0000000040)={0x11, 0x4, r2, 0x1, 0x81, 0x6, @random="0070f7672562"}, 0x14) (rerun: 32) 08:48:28 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:28 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x8100000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:28 executing program 2: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/hackrf', 0x100, 0x0) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x1, &(0x7f0000000140)=""/228, 0xe4}, &(0x7f0000000280)=0x40) recvfrom$packet(r0, &(0x7f0000000000)=""/18, 0x12, 0x0, &(0x7f0000000040)={0x11, 0x4, r2, 0x1, 0x81, 0x6, @random="0070f7672562"}, 0x14) 08:48:28 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:28 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x40000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:28 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x47ee0000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:28 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x87, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:29 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x87000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:29 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpu.weight.nice\x00', 0x2, 0x0) (async, rerun: 64) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 64) openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) (rerun: 64) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000000300)='cpuset.cpus\x00', 0x2, 0x0) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/vrf', 0x40480, 0x80) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000003c0)={'batadv_slave_0\x00'}) (async) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000340)=0xc410040) (async) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$TFD_IOC_SET_TICKS(r7, 0x40085400, &(0x7f0000000380)=0x7f) write$cgroup_int(r5, &(0x7f00000000c0)=0x7, 0x12) (async) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) (async) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000200)={'erspan0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x80, 0x0, 0x2, 0x5, {{0x14, 0x4, 0x1, 0x0, 0x50, 0x65, 0x0, 0x21, 0x29, 0x0, @private=0xa010101, @broadcast, {[@noop, @timestamp_prespec={0x44, 0xc, 0x99, 0x3, 0x3, [{@loopback, 0x4}]}, @rr={0x7, 0x7, 0x49, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @rr={0x7, 0xb, 0xe4, [@loopback, @loopback, @multicast2, @broadcast, @loopback, @rand_addr=0x64010102]}, @lsrr={0x83, 0xb, 0xfb, [@empty, @local]}]}}}}}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r8, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10001}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xfffff000}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r9}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x6000000) 08:48:29 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x300, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:29 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0xfdef}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:29 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpu.weight.nice\x00', 0x2, 0x0) (async, rerun: 32) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async, rerun: 32) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000000300)='cpuset.cpus\x00', 0x2, 0x0) (async) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/vrf', 0x40480, 0x80) (async) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000003c0)={'batadv_slave_0\x00'}) (async) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000340)=0xc410040) (async) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$TFD_IOC_SET_TICKS(r7, 0x40085400, &(0x7f0000000380)=0x7f) write$cgroup_int(r5, &(0x7f00000000c0)=0x7, 0x12) (async) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000080)) (async) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000200)={'erspan0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x80, 0x0, 0x2, 0x5, {{0x14, 0x4, 0x1, 0x0, 0x50, 0x65, 0x0, 0x21, 0x29, 0x0, @private=0xa010101, @broadcast, {[@noop, @timestamp_prespec={0x44, 0xc, 0x99, 0x3, 0x3, [{@loopback, 0x4}]}, @rr={0x7, 0x7, 0x49, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @rr={0x7, 0xb, 0xe4, [@loopback, @loopback, @multicast2, @broadcast, @loopback, @rand_addr=0x64010102]}, @lsrr={0x83, 0xb, 0xfb, [@empty, @local]}]}}}}}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r8, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10001}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xfffff000}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r9}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x6000000) 08:48:29 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0xffff0000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/30, 0x1e, 0x2, 0x0, 0x0) 08:48:29 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:29 executing program 3: socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x0, 0x6, 0x3}, @L2TP_ATTR_MRU={0x6, 0x1d, 0xfffd}, @L2TP_ATTR_SEND_SEQ, @L2TP_ATTR_PW_TYPE, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x4040}, 0x24000000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x13c, r3, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x200}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x88, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x38, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0x18, 0x2, 'hugetlb.1GB.failcnt\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffe1}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x45, 0x4, "dcf8acf358dbcb0f5797059d357d43591794e1dac732a41b0063c103ccfe3cf8ae2cd76b55043f672585ebd893ec97b699086313758adb59508523c50adca3d995"}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 08:48:29 executing program 3: socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x0, 0x6, 0x3}, @L2TP_ATTR_MRU={0x6, 0x1d, 0xfffd}, @L2TP_ATTR_SEND_SEQ, @L2TP_ATTR_PW_TYPE, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x4040}, 0x24000000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x13c, r3, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x200}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x88, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x38, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0x18, 0x2, 'hugetlb.1GB.failcnt\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffe1}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x45, 0x4, "dcf8acf358dbcb0f5797059d357d43591794e1dac732a41b0063c103ccfe3cf8ae2cd76b55043f672585ebd893ec97b699086313758adb59508523c50adca3d995"}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x0, 0x6, 0x3}, @L2TP_ATTR_MRU={0x6, 0x1d, 0xfffd}, @L2TP_ATTR_SEND_SEQ, @L2TP_ATTR_PW_TYPE, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x4040}, 0x24000000) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) (async) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x13c, r3, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x200}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x88, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x38, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0x18, 0x2, 'hugetlb.1GB.failcnt\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffe1}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x45, 0x4, "dcf8acf358dbcb0f5797059d357d43591794e1dac732a41b0063c103ccfe3cf8ae2cd76b55043f672585ebd893ec97b699086313758adb59508523c50adca3d995"}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) (async) 08:48:29 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/mISDN_core', 0x0, 0x84) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/schedstat\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000040)=r4) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) bind$packet(r1, &(0x7f0000000000)={0x11, 0x17, 0x0, 0x1, 0x20, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x31}}, 0x14) 08:48:29 executing program 3: socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x0, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x0, 0x6, 0x3}, @L2TP_ATTR_MRU={0x6, 0x1d, 0xfffd}, @L2TP_ATTR_SEND_SEQ, @L2TP_ATTR_PW_TYPE, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x4040}, 0x24000000) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x40, r3, 0x1, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}]}]}, 0x40}}, 0x0) (async) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x13c, r3, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x200}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x88, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x38, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0x18, 0x2, 'hugetlb.1GB.failcnt\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffe1}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x45, 0x4, "dcf8acf358dbcb0f5797059d357d43591794e1dac732a41b0063c103ccfe3cf8ae2cd76b55043f672585ebd893ec97b699086313758adb59508523c50adca3d995"}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) 08:48:29 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="a5a602d4", @ANYRES16=r2, @ANYBLOB="00042dbd700000000080090000000500290001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4048004) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:29 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x80000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:29 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="a5a602d4", @ANYRES16=r2, @ANYBLOB="00042dbd700000000080090000000500290001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4048004) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:30 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0xfdfc}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:30 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x500, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:30 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r1) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="a5a602d4", @ANYRES16=r2, @ANYBLOB="00042dbd700000000080090000000500290001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4048004) (async) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="a5a602d4", @ANYRES16=r2, @ANYBLOB="00042dbd700000000080090000000500290001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4048004) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/30, 0x1e, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/30, 0x1e, 0x2, 0x0, 0x0) (async) 08:48:30 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x100000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:30 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/mISDN_core', 0x0, 0x84) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/schedstat\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000040)=r4) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) bind$packet(r1, &(0x7f0000000000)={0x11, 0x17, 0x0, 0x1, 0x20, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x31}}, 0x14) socket$packet(0x11, 0x3, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/mISDN_core', 0x0, 0x84) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/schedstat\x00', 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000040)=r4) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) bind$packet(r1, &(0x7f0000000000)={0x11, 0x17, 0x0, 0x1, 0x20, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x31}}, 0x14) (async) 08:48:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000002580)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xeb0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xfd, 0x5, "3aa0c699d8a0f73d5579a37220269e42d6a3f176e2e9c9aeccf141e1ee68278b4966893a09860ff8b011d9d2c2d8d0f3e164daf150d18da40397664e7950117b4e80a5c5e81fa716880d46bcd98043793407c1ddd0b2fb9dfd2bbbadd26aec02d61684dfd945da2969d484201cbd076bf837b508be7659530dc64caf8ceb3b28879b1db0a89e48687a67d30b0f53d8a002f00bfb622d4ffa06c3cc56cf2f2bc5aa5d51c7db1c94098a1638fc00d9e6e6dea876915f64e26f9765f28ea5ac0bab21fc0a1e9cb0d65e419cad8f296f67bc5045328d9ebeb2648d0c90a7b3df0cf17786fb8eb7787baa6fb7490d02f4c27b9b0844804342d6faae"}, @ETHTOOL_A_BITSET_VALUE={0xda9, 0x4, "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"}]}]}, 0xec4}}, 0xc0) r1 = socket$packet(0x11, 0x2, 0x300) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{}, {0x4d}]}) r2 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) getpeername$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r3, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x148, r4, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x148}}, 0x20000004) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000002580)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xeb0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xfd, 0x5, "3aa0c699d8a0f73d5579a37220269e42d6a3f176e2e9c9aeccf141e1ee68278b4966893a09860ff8b011d9d2c2d8d0f3e164daf150d18da40397664e7950117b4e80a5c5e81fa716880d46bcd98043793407c1ddd0b2fb9dfd2bbbadd26aec02d61684dfd945da2969d484201cbd076bf837b508be7659530dc64caf8ceb3b28879b1db0a89e48687a67d30b0f53d8a002f00bfb622d4ffa06c3cc56cf2f2bc5aa5d51c7db1c94098a1638fc00d9e6e6dea876915f64e26f9765f28ea5ac0bab21fc0a1e9cb0d65e419cad8f296f67bc5045328d9ebeb2648d0c90a7b3df0cf17786fb8eb7787baa6fb7490d02f4c27b9b0844804342d6faae"}, @ETHTOOL_A_BITSET_VALUE={0xda9, 0x4, "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"}]}]}, 0xec4}}, 0xc0) (async) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000002580)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xeb0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xfd, 0x5, "3aa0c699d8a0f73d5579a37220269e42d6a3f176e2e9c9aeccf141e1ee68278b4966893a09860ff8b011d9d2c2d8d0f3e164daf150d18da40397664e7950117b4e80a5c5e81fa716880d46bcd98043793407c1ddd0b2fb9dfd2bbbadd26aec02d61684dfd945da2969d484201cbd076bf837b508be7659530dc64caf8ceb3b28879b1db0a89e48687a67d30b0f53d8a002f00bfb622d4ffa06c3cc56cf2f2bc5aa5d51c7db1c94098a1638fc00d9e6e6dea876915f64e26f9765f28ea5ac0bab21fc0a1e9cb0d65e419cad8f296f67bc5045328d9ebeb2648d0c90a7b3df0cf17786fb8eb7787baa6fb7490d02f4c27b9b0844804342d6faae"}, @ETHTOOL_A_BITSET_VALUE={0xda9, 0x4, "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"}]}]}, 0xec4}}, 0xc0) r1 = socket$packet(0x11, 0x2, 0x300) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{}, {0x4d}]}) r2 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) getpeername$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) (async) getpeername$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r3, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x148, r4, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x148}}, 0x20000004) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:30 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000002580)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xeb0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xfd, 0x5, "3aa0c699d8a0f73d5579a37220269e42d6a3f176e2e9c9aeccf141e1ee68278b4966893a09860ff8b011d9d2c2d8d0f3e164daf150d18da40397664e7950117b4e80a5c5e81fa716880d46bcd98043793407c1ddd0b2fb9dfd2bbbadd26aec02d61684dfd945da2969d484201cbd076bf837b508be7659530dc64caf8ceb3b28879b1db0a89e48687a67d30b0f53d8a002f00bfb622d4ffa06c3cc56cf2f2bc5aa5d51c7db1c94098a1638fc00d9e6e6dea876915f64e26f9765f28ea5ac0bab21fc0a1e9cb0d65e419cad8f296f67bc5045328d9ebeb2648d0c90a7b3df0cf17786fb8eb7787baa6fb7490d02f4c27b9b0844804342d6faae"}, @ETHTOOL_A_BITSET_VALUE={0xda9, 0x4, "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"}]}]}, 0xec4}}, 0xc0) socket$packet(0x11, 0x2, 0x300) (async) r1 = socket$packet(0x11, 0x2, 0x300) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{}, {0x4d}]}) r2 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) getpeername$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r3, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x148, r4, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x148}}, 0x20000004) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:30 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r1) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r2, 0x704, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x20040080}, 0x4) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:30 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r1) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r2, 0x704, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x20040080}, 0x4) (async, rerun: 32) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (rerun: 32) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:30 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/mISDN_core', 0x0, 0x84) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/schedstat\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000040)=r4) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) bind$packet(r1, &(0x7f0000000000)={0x11, 0x17, 0x0, 0x1, 0x20, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x31}}, 0x14) socket$packet(0x11, 0x3, 0x300) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/mISDN_core', 0x0, 0x84) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (async) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/schedstat\x00', 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000040)=r4) (async) openat$cgroup_int(r1, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) bind$packet(r1, &(0x7f0000000000)={0x11, 0x17, 0x0, 0x1, 0x20, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x31}}, 0x14) (async) 08:48:31 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0xfdfe}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:31 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x200000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:31 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) r1 = socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r1) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r2, 0x704, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x20040080}, 0x4) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:31 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x600, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:31 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x6b6f}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x59}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1dee}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8000}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/30, 0x1e, 0x2, 0x0, 0x0) 08:48:31 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14, 0x0) r2 = accept$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) accept4$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14, 0x80000) accept$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000040)=""/28, 0x23, 0x40000142, 0x0, 0x0) 08:48:31 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x6b6f}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x59}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1dee}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8000}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40) (async) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000040)=""/28, 0x23, 0x40000142, 0x0, 0x0) 08:48:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000040)=""/28, 0x23, 0x40000142, 0x0, 0x0) 08:48:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000040)=""/50, 0x32, 0x2, 0x0, 0x0) 08:48:32 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x300000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:32 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x810, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:32 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000040)=""/50, 0x32, 0x2, 0x0, 0x0) 08:48:32 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x6b6f}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x59}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1dee}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8000}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40) r1 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r1, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:32 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0xfdff}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:32 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) (async) socket(0x2a, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14, 0x0) (async) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14, 0x0) r2 = accept$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) accept4$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14, 0x80000) (async) accept4$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14, 0x80000) accept$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:32 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x400000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:32 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x1008, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:32 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = accept4$packet(r0, 0x0, &(0x7f0000000000), 0x400) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x40, 0x40, 0x61, 0xd4, {{0x6, 0x4, 0x0, 0x6, 0x18, 0x67, 0x0, 0x0, 0x4, 0x0, @private=0xa010102, @empty, {[@end]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'gre0\x00', &(0x7f0000000240)={'sit0\x00', 0x0, 0x80, 0x8, 0x4, 0x5, {{0x23, 0x4, 0x3, 0x0, 0x8c, 0x64, 0x0, 0x3, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102, {[@ssrr={0x89, 0x23, 0xd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x28}, @empty, @local, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x1b}, @multicast2]}, @ssrr={0x89, 0x23, 0xe9, [@broadcast, @private=0xa010101, @private=0xa010102, @loopback, @rand_addr=0x64010100, @multicast2, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x27, 0xd4, [@remote, @broadcast, @empty, @local, @multicast1, @loopback, @remote, @rand_addr=0x64010100, @multicast2]}, @ra={0x94, 0x4}]}}}}}) r15 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r15, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r15, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r15, 0x8, '\x00', r16, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x220, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x80, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r16}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x20000800}, 0x20000895) 08:48:32 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x500000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:32 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x4000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:32 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = accept4$packet(r0, 0x0, &(0x7f0000000000), 0x400) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) (async, rerun: 64) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async, rerun: 32) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) (rerun: 32) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) (rerun: 32) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x40, 0x40, 0x61, 0xd4, {{0x6, 0x4, 0x0, 0x6, 0x18, 0x67, 0x0, 0x0, 0x4, 0x0, @private=0xa010102, @empty, {[@end]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'gre0\x00', &(0x7f0000000240)={'sit0\x00', 0x0, 0x80, 0x8, 0x4, 0x5, {{0x23, 0x4, 0x3, 0x0, 0x8c, 0x64, 0x0, 0x3, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102, {[@ssrr={0x89, 0x23, 0xd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x28}, @empty, @local, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x1b}, @multicast2]}, @ssrr={0x89, 0x23, 0xe9, [@broadcast, @private=0xa010101, @private=0xa010102, @loopback, @rand_addr=0x64010100, @multicast2, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x27, 0xd4, [@remote, @broadcast, @empty, @local, @multicast1, @loopback, @remote, @rand_addr=0x64010100, @multicast2]}, @ra={0x94, 0x4}]}}}}}) r15 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r15, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r15, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r15, 0x8, '\x00', r16, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x220, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x80, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r16}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x20000800}, 0x20000895) 08:48:32 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14, 0x0) r2 = accept$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) accept4$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14, 0x80000) accept$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:32 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000040)=""/50, 0x32, 0x2, 0x0, 0x0) 08:48:32 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x600000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:32 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = timerfd_create(0x2, 0x800) ioctl$TFD_IOC_SET_TICKS(r1, 0x40085400, &(0x7f0000000000)=0x1) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:33 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x810000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:33 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x47ee, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:33 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = accept4$packet(r0, 0x0, &(0x7f0000000000), 0x400) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', r2, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r4, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0x8, '\x00', r5, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r8, 0x8, '\x00', r9, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r10 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r10, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0x8, '\x00', r11, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x40, 0x40, 0x61, 0xd4, {{0x6, 0x4, 0x0, 0x6, 0x18, 0x67, 0x0, 0x0, 0x4, 0x0, @private=0xa010102, @empty, {[@end]}}}}}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'gre0\x00', &(0x7f0000000240)={'sit0\x00', 0x0, 0x80, 0x8, 0x4, 0x5, {{0x23, 0x4, 0x3, 0x0, 0x8c, 0x64, 0x0, 0x3, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102, {[@ssrr={0x89, 0x23, 0xd, [@multicast1, @dev={0xac, 0x14, 0x14, 0x28}, @empty, @local, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x1b}, @multicast2]}, @ssrr={0x89, 0x23, 0xe9, [@broadcast, @private=0xa010101, @private=0xa010102, @loopback, @rand_addr=0x64010100, @multicast2, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x27, 0xd4, [@remote, @broadcast, @empty, @local, @multicast1, @loopback, @remote, @rand_addr=0x64010100, @multicast2]}, @ra={0x94, 0x4}]}}}}}) (async) r15 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r15, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r15, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r15, 0x8, '\x00', r16, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x220, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x80, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r16}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x20000800}, 0x20000895) 08:48:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) (async, rerun: 32) socket(0x2a, 0x0, 0x0) (async, rerun: 32) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r1 = timerfd_create(0x2, 0x800) (rerun: 32) ioctl$TFD_IOC_SET_TICKS(r1, 0x40085400, &(0x7f0000000000)=0x1) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:33 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/47, 0x2f, 0x2, 0x0, 0x0) 08:48:33 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0xfe00}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:33 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) 08:48:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = timerfd_create(0x2, 0x800) ioctl$TFD_IOC_SET_TICKS(r1, 0x40085400, &(0x7f0000000000)=0x1) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) timerfd_create(0x2, 0x800) (async) ioctl$TFD_IOC_SET_TICKS(r1, 0x40085400, &(0x7f0000000000)=0x1) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:33 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x8700, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:33 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x4000000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x9) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:33 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x47ee000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:33 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0xee47, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:34 executing program 2: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/47, 0x2f, 0x2, 0x0, 0x0) 08:48:34 executing program 0: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) 08:48:34 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x8700000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:34 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x800000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:34 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0xfefd}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:34 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x9) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x9) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:34 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) 08:48:34 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x2a, 0x0, 0x9) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) (async) socket(0x2a, 0x0, 0x9) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) 08:48:34 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x1000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:34 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0xffff000000000000, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:34 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5, 0x2010, r0, 0x9299a000) socket(0x2a, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:34 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000000)=""/47, 0x2f, 0x2, 0x0, 0x0) 08:48:34 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x2000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:34 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5, 0x2010, r0, 0x9299a000) (async) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:34 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:35 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:35 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/snd_usb_hiface', 0x10002, 0x1) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x0, 0x8, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7fff}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x163377bf29c4e897) r2 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r2, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r3 = accept$packet(r0, &(0x7f0000000180), &(0x7f00000001c0)=0x14) setsockopt$packet_int(r3, 0x107, 0x12, &(0x7f0000000200)=0x3, 0x4) 08:48:35 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5, 0x2010, r0, 0x9299a000) socket(0x2a, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) 08:48:35 executing program 1: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0xfffd}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 08:48:35 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x3000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001180)={0x14, r1, 0x101}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000540)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x28, r4, 0x711, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x28}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r1, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x964}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) accept$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) recvfrom$packet(r6, &(0x7f00000000c0)=""/40, 0xffffffffffffff74, 0x10002, 0x0, 0x0) 08:48:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) (rerun: 32) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001180)={0x14, r1, 0x101}, 0x14}}, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000540)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x28, r4, 0x711, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x28}}, 0x0) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r1, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x964}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) accept$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) (async) recvfrom$packet(r6, &(0x7f00000000c0)=""/40, 0xffffffffffffff74, 0x10002, 0x0, 0x0) 08:48:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001180)={0x14, r1, 0x101}, 0x14}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000540)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x28, r4, 0x711, 0x0, 0x0, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x28}}, 0x0) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r1, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x964}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) (async) r6 = socket$packet(0x11, 0x2, 0x300) accept$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) recvfrom$packet(r6, &(0x7f00000000c0)=""/40, 0xffffffffffffff74, 0x10002, 0x0, 0x0) 08:48:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) r1 = socket(0x11, 0x2, 0x8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x84, 0x0, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20040095}, 0x48050) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r3, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r3, 0x8, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r5, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x2, 0x0, r5, 0x8, '\x00', r6, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000240)={0x1b, 0x0, 0x0, 0x0, 0x0, r7, 0xd7, '\x00', 0x0, r3, 0x5, 0x1, 0x2}, 0x48) openat$cgroup_int(r8, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x40, 0x0, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @rand_addr=0x64010101}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private0={0xfc, 0x0, '\x00', 0x1}}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x6}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) ioctl$TUNSETIFINDEX(r8, 0x400454da, &(0x7f0000000200)) 08:48:35 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x4, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:35 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x4000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:35 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000002540)='hugetlb.1GB.failcnt\x00', 0x2, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/snd_usb_hiface', 0x10002, 0x1) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x0, 0x8, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7fff}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x163377bf29c4e897) (async) r2 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r2, &(0x7f0000000600)=""/45, 0x2d, 0x2, 0x0, 0x0) (async) r3 = accept$packet(r0, &(0x7f0000000180), &(0x7f00000001c0)=0x14) setsockopt$packet_int(r3, 0x107, 0x12, &(0x7f0000000200)=0x3, 0x4) 08:48:35 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002500)='/sys/module/hackrf', 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 08:48:35 executing program 5: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x3, &(0x7f0000000240)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x5000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 08:48:35 executing program 4: io_setup(0x4, &(0x7f0000000400)=0x0) r1 = openat$