{}, [@ETHTOOL_A_LINKMODES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4010}, 0x85) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000c40)={'batadv_slave_0\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) [ 69.462570][T10027] chnl_net:caif_netlink_parms(): no params data found 00:01:09 executing program 2: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) r2 = socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r4, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r6 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r5, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f00000008c0)=0x1) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x58, 0xc, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4011}, 0x801) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a80), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000bc0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000ac0)={0xb8, r7, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4010}, 0x85) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000c40)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r6, &(0x7f0000000d40)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000d00)={&(0x7f0000000c80)={0x4c, 0x0, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7ff}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4010}, 0x20008080) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000d80)={r2}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000000dc0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r9, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) ioctl$SNDRV_TIMER_IOCTL_INFO(r6, 0x80e85411, &(0x7f0000001040)=""/23) 00:01:09 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:09 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:09 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r5 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r4, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x58, 0xc, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4011}, 0x801) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a80), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000bc0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000ac0)={0xb8, r6, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4010}, 0x85) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 69.608107][ T8] cfg80211: failed to load regulatory.db 00:01:09 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) [ 69.626350][ T470] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 00:01:09 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:09 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:09 executing program 2: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r5 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r4, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x58, 0xc, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4011}, 0x801) syz_genetlink_get_family_id$ethtool(&(0x7f0000000a80), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:09 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) r2 = socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r4, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r6 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r5, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f00000008c0)=0x1) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x58, 0xc, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4011}, 0x801) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a80), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000bc0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000ac0)={0xb8, r7, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4010}, 0x85) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000c40)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r6, &(0x7f0000000d40)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000d00)={&(0x7f0000000c80)={0x4c, 0x0, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7ff}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4010}, 0x20008080) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000d80)={r2}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000000dc0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r9, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:09 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:09 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:09 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:09 executing program 2: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x11, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:09 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r5 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r4, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x58, 0xc, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4011}, 0x801) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:09 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) [ 69.847253][T10027] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.852978][T10027] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.857358][T10027] bridge_slave_0: entered allmulticast mode [ 69.861950][T10027] bridge_slave_0: entered promiscuous mode 00:01:09 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) [ 69.869263][T10027] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.871343][T10027] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.873513][T10027] bridge_slave_1: entered allmulticast mode [ 69.876169][T10027] bridge_slave_1: entered promiscuous mode 00:01:09 executing program 2: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) r2 = socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r4, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r6 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r5, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f00000008c0)=0x1) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x58, 0xc, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4011}, 0x801) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a80), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000bc0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000ac0)={0xb8, r7, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4010}, 0x85) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000c40)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r6, &(0x7f0000000d40)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000d00)={&(0x7f0000000c80)={0x4c, 0x0, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7ff}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4010}, 0x20008080) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000d80)={r2}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r9, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:09 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x11, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:09 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) [ 69.963321][T10027] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.977803][T10027] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.004232][T10027] team0: Port device team_slave_0 added 00:01:09 executing program 2: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r5 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r4, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x58, 0xc, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4011}, 0x801) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 70.011756][T10027] team0: Port device team_slave_1 added 00:01:10 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r5 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r4, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x58, 0xc, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4011}, 0x801) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a80), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000bc0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000ac0)={0xb8, r6, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4010}, 0x85) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000c40)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000d40)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000d00)={&(0x7f0000000c80)={0x4c, 0x0, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7ff}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4010}, 0x20008080) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:10 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x11, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:10 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:10 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:10 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x0, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:10 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r5 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r4, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x58, 0xc, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4011}, 0x801) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a80), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000bc0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000ac0)={0xb8, r6, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4010}, 0x85) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000c40)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000d40)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000d00)={&(0x7f0000000c80)={0x4c, 0x0, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7ff}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4010}, 0x20008080) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:10 executing program 2: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000008c0)=0x1) [ 70.186113][T10027] batman_adv: batadv0: Adding interface: batadv_slave_0 00:01:10 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r5 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r4, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 70.195391][T10027] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 00:01:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) [ 70.238800][T10027] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 70.243629][T10027] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 70.245477][T10027] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 70.267518][T10027] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 00:01:10 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x0, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:10 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r5 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r4, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:10 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) 00:01:10 executing program 2: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x0, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:10 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:10 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r5 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r4, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x58, 0xc, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4011}, 0x801) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a80), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000bc0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000ac0)={0xb8, r6, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4010}, 0x85) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000c40)={'batadv_slave_0\x00'}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) 00:01:10 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) [ 70.501542][T10027] hsr_slave_0: entered promiscuous mode 00:01:10 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)) memfd_secret(0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:10 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:10 executing program 2: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r5 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r4, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x58, 0xc, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4011}, 0x801) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a80), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000bc0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000ac0)={0xb8, r6, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x3}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4010}, 0x85) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:10 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r14 = memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10}, 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r14) [ 70.579483][T10027] hsr_slave_1: entered promiscuous mode [ 70.646137][ T6198] Bluetooth: hci5: command 0x0409 tx timeout [ 70.646780][T10027] debugfs: Directory 'hsr0' with parent 'hsr' already present! 00:01:10 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) [ 70.669349][T10027] Cannot create hsr debugfs directory 00:01:10 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:10 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r14 = memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r14) 00:01:10 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r5 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r4, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x58, 0xc, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4011}, 0x801) syz_genetlink_get_family_id$ethtool(&(0x7f0000000a80), r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:10 executing program 2: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r14 = memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r14) 00:01:10 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:10 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r14 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r14) 00:01:10 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:10 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r5 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r4, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x58, 0xc, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4011}, 0x801) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:10 executing program 2: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:10 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), 0xffffffffffffffff) 00:01:11 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:11 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:11 executing program 2: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r5 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r4, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:11 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), 0xffffffffffffffff) 00:01:11 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), 0xffffffffffffffff) 00:01:11 executing program 2: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:11 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r5 = memfd_secret(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000600)='syzkaller\x00', 0x7, 0xc6, &(0x7f0000000640)=""/198, 0x41000, 0x65, '\x00', r4, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x5, 0x7, 0x7e, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r0, r0, r0, 0xffffffffffffffff, r0, r0]}, 0x90) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:11 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0x0, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:11 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:11 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) r13 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r13) 00:01:11 executing program 2: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0x0, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:11 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:11 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)) memfd_secret(0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r13 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r13) 00:01:11 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0x0, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:11 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:11 executing program 2: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) r13 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r13) 00:01:11 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:11 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000740)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:11 executing program 2: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:11 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r0) 00:01:11 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:11 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:11 executing program 2: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000540)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:11 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:11 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r0) 00:01:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:11 executing program 2: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x11, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:11 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:11 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:11 executing program 2: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x202002) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:11 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x11, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r0) 00:01:11 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:11 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:11 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x11, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:11 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r0) 00:01:11 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000400)={{0x0, 0x2, 0x6e1a, 0x2, 0x6}, 0xffffffc1, 0x7fffffff, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x0, 0x1, 0x9}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:12 executing program 1: memfd_secret(0x80000) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:12 executing program 2: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:12 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r0) 00:01:12 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:12 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x6c, 0x0, 0x7, 0xb00, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x101}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000000}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000091}, 0x3845e8158e29be3f) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:12 executing program 2: openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:12 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:12 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r0) 00:01:12 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:12 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r0) 00:01:12 executing program 2: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r8 = memfd_secret(0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x9, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r9, r1, 0xffffffffffffffff, r10, r11, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r8, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r8, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r11, r12, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r13 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r12], 0x0, 0x10, 0x6}, 0x90) 00:01:12 executing program 1: openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:12 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:12 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:12 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r0) 00:01:12 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r8 = memfd_secret(0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x9, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r9, r1, 0xffffffffffffffff, r10, r11, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r8, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r8, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r11, r12, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r13 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r12], 0x0, 0x10, 0x6}, 0x90) 00:01:12 executing program 3: openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000008c0)=0x1) [ 72.500055][T10027] netdevsim netdevsim0 netdevsim0: renamed from eth0 00:01:12 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:12 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:12 executing program 2: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r8 = memfd_secret(0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x9, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r9, r1, 0xffffffffffffffff, r10, r11, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r8, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r8, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r11, r12, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r13 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r12], 0x0, 0x10, 0x6}, 0x90) 00:01:12 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r0) [ 72.557066][T10027] netdevsim netdevsim0 netdevsim1: renamed from eth1 00:01:12 executing program 2: openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:12 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r8 = memfd_secret(0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r9, r1, 0xffffffffffffffff, r10, r11, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r8, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r8, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r11, r12, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r13 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r12], 0x0, 0x10, 0x6}, 0x90) 00:01:12 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r0) 00:01:12 executing program 2: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x3, 0x3, 0x3, 0x1, 0x4}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:12 executing program 1: openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:12 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r8 = memfd_secret(0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r9, r1, 0xffffffffffffffff, r10, r11, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r8, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r8, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r11, r12, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r13 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r12], 0x0, 0x10, 0x6}, 0x90) 00:01:12 executing program 4: openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r0) [ 72.735879][ T6198] Bluetooth: hci5: command 0x041b tx timeout 00:01:12 executing program 3: openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000008c0)=0x1) 00:01:12 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:12 executing program 2: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r8 = memfd_secret(0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r9, r1, 0xffffffffffffffff, r10, r11, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r8, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r8, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r11, r12, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r13 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r12], 0x0, 0x10, 0x6}, 0x90) 00:01:12 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f00000001c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) [ 72.797907][T10027] netdevsim netdevsim0 netdevsim2: renamed from eth2 00:01:12 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:12 executing program 4: openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000008c0)=0x1) [ 72.837279][T10027] netdevsim netdevsim0 netdevsim3: renamed from eth3 00:01:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r0) 00:01:12 executing program 2: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) read$char_usb(r0, &(0x7f0000000180)=""/53, 0x35) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:12 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:12 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:12 executing program 1: openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0x0) [ 72.942755][ T470] hsr_slave_0: left promiscuous mode 00:01:12 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r0) [ 72.967784][ T470] hsr_slave_1: left promiscuous mode 00:01:12 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:12 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:12 executing program 4: openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0x0) 00:01:13 executing program 2: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:13 executing program 4: r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r0) [ 73.066265][ T470] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 73.079993][ T470] batman_adv: batadv0: Removing interface: batadv_slave_0 00:01:13 executing program 1: openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0x0) [ 73.089613][ T470] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 73.097247][ T470] batman_adv: batadv0: Removing interface: batadv_slave_1 00:01:13 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) [ 73.107998][ T470] bridge_slave_1: left allmulticast mode [ 73.109755][ T470] bridge_slave_1: left promiscuous mode [ 73.111433][ T470] bridge0: port 2(bridge_slave_1) entered disabled state 00:01:13 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:13 executing program 2: r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(0x0, r0) 00:01:13 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 73.180069][ T470] bridge_slave_0: left allmulticast mode [ 73.181727][ T470] bridge_slave_0: left promiscuous mode [ 73.183251][ T470] bridge0: port 1(bridge_slave_0) entered disabled state 00:01:13 executing program 3: openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000008c0)) 00:01:13 executing program 2: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:13 executing program 1: r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(0x0, r0) 00:01:13 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:13 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:13 executing program 1: openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000008c0)) 00:01:13 executing program 4: r0 = memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(0x0, r0) 00:01:13 executing program 2: memfd_secret(0x80000) openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 73.347716][ T470] veth1_macvtap: left promiscuous mode [ 73.353030][ T470] veth0_macvtap: left promiscuous mode 00:01:13 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) [ 73.355638][ T470] veth1_vlan: left promiscuous mode [ 73.358634][ T470] veth0_vlan: left promiscuous mode 00:01:13 executing program 3: openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000008c0)) 00:01:13 executing program 4: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x4, @local, 0x7}}}, 0x38) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:13 executing program 2: memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), 0xffffffffffffffff) 00:01:13 executing program 1: openat$nci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:13 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:13 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:13 executing program 4: openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:13 executing program 3: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:13 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x11, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:13 executing program 3: openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:13 executing program 1: r0 = memfd_secret(0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:13 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x11, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:13 executing program 4: openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 00:01:13 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:13 executing program 3: memfd_secret(0x80000) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:13 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x11, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:13 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000fc0)={'NETMAP\x00'}, &(0x7f0000001000)=0x1e) 00:01:13 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:13 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:13 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x0, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:13 executing program 4: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, &(0x7f0000001000)) 00:01:13 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:13 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x0, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:13 executing program 3: getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) 00:01:14 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:14 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x0, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:14 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) [ 74.230797][ T470] team0 (unregistering): Port device team_slave_1 removed [ 74.250883][ T470] team0 (unregistering): Port device team_slave_0 removed [ 74.274416][ T470] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 74.328620][ T470] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 74.636282][ T470] bond0 (unregistering): Released all slaves 00:01:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:14 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0x0, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:14 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) r24 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r24}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:14 executing program 4: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) 00:01:14 executing program 1: memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), 0xffffffffffffffff) [ 74.806285][ T6198] Bluetooth: hci5: command 0x040f tx timeout 00:01:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r16, &(0x7f0000002900)={&(0x7f0000002840)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002880)={0x24, r22, 0x8, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x8}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x8008080) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) [ 74.824267][T10027] 8021q: adding VLAN 0 to HW filter on device bond0 00:01:14 executing program 2: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0x0, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) [ 74.845682][T10027] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.877993][ T6174] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.880042][ T6174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.883415][ T6174] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.885376][ T6174] bridge0: port 2(bridge_slave_1) entered forwarding state 00:01:14 executing program 1: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) 00:01:14 executing program 2: memfd_secret(0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), 0xffffffffffffffff) 00:01:14 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0x0, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) [ 74.954494][T10027] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 74.972166][T10027] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 00:01:14 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) r22 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, r22, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:14 executing program 2: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) 00:01:15 executing program 3: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) 00:01:15 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:15 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) r21 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r21, 0x89f3, &(0x7f0000002500)={'syztnl2\x00', &(0x7f0000002480)={'ip6tnl0\x00', r4, 0x2f, 0x1a, 0x1f, 0x6, 0x60, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x20, 0x8, 0x7ff, 0x1}}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) 00:01:15 executing program 2: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) 00:01:15 executing program 4: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) [ 75.241740][T10027] 8021q: adding VLAN 0 to HW filter on device batadv0 00:01:15 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) syz_genetlink_get_family_id$ethtool(&(0x7f0000002440), r16) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) [ 75.326766][T10027] veth0_vlan: entered promiscuous mode 00:01:15 executing program 3: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) [ 75.351237][T10027] veth1_vlan: entered promiscuous mode [ 75.413451][T10027] veth0_macvtap: entered promiscuous mode [ 75.433911][T10027] veth1_macvtap: entered promiscuous mode 00:01:15 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x0, r16, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r6, r19, r20, r6], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) [ 75.462033][T10027] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 75.464826][T10027] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 00:01:15 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:15 executing program 2: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) [ 75.507658][T10027] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 75.510431][T10027] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.513028][T10027] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 75.537455][T10027] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.540061][T10027] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 00:01:15 executing program 1: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) 00:01:15 executing program 4: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) [ 75.558525][T10027] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.571733][T10027] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 75.583307][T10027] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 00:01:15 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) [ 75.599402][T10027] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.606941][T10027] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.609756][T10027] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.624867][T10027] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.636106][T10027] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.644416][T10027] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 00:01:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r20 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r9, 0x20, '\x00', r4, r16, 0x2, 0x2, 0x4}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, r20], 0x0, 0x10, 0x6}, 0x90) [ 75.667315][T10027] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.679360][T10027] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 75.700571][T10027] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.702908][T10027] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.705207][T10027] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.738155][T10027] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 00:01:15 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) r16 = memfd_secret(0x0) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r16, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r17, r2, 0xffffffffffffffff, r18, r19, r14], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 00:01:15 executing program 2: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) 00:01:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={r10}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 00:01:15 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) [ 75.919445][ T6241] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 75.921515][ T6241] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 00:01:15 executing program 1: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) 00:01:15 executing program 2: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) 00:01:15 executing program 3: sched_rr_get_interval(0x0, &(0x7f0000000000)) 00:01:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{r10}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 00:01:16 executing program 4: sched_rr_get_interval(0x0, &(0x7f0000000000)) [ 76.029028][ T6240] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.031194][ T6240] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 00:01:16 executing program 2: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, 0x0, 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:16 executing program 3: getpid() syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) 00:01:16 executing program 0: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000004d40)={0x26, 0x9, 0x7f}) 00:01:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) memfd_secret(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 00:01:16 executing program 2: sched_rr_get_interval(0x0, &(0x7f0000000000)) 00:01:16 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, 0x0, 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:16 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) 00:01:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 00:01:16 executing program 2: rt_sigqueueinfo(0x0, 0x6, 0x0) 00:01:16 executing program 3: getpid() sched_rr_get_interval(0x0, &(0x7f0000000000)) 00:01:16 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, 0x0, 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:16 executing program 4: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) 00:01:16 executing program 0: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 00:01:16 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r11}, &(0x7f0000000b80), &(0x7f0000000bc0)=r13}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 00:01:16 executing program 3: rt_sigqueueinfo(0x0, 0x6, 0x0) 00:01:16 executing program 1: getpid() sched_rr_get_interval(0x0, &(0x7f0000000000)) 00:01:16 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:16 executing program 0: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) 00:01:16 executing program 2: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 00:01:16 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 00:01:16 executing program 4: getpid() sched_rr_get_interval(0x0, &(0x7f0000000000)) 00:01:16 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:16 executing program 3: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) 00:01:16 executing program 2: rt_sigqueueinfo(0x0, 0x6, 0x0) 00:01:16 executing program 4: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 00:01:16 executing program 1: r0 = getpid() sched_rr_get_interval(r0, 0x0) 00:01:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 00:01:16 executing program 0: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) 00:01:16 executing program 2: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:16 executing program 3: rt_sigqueueinfo(0x0, 0x6, &(0x7f0000004d40)={0x0, 0x9, 0x7f}) 00:01:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1d, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x41}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x4000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0xd9, &(0x7f0000000380)=""/217, 0x41000, 0x10, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xa, 0x8, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000980)=[r5, r6, r7, r8, r9, r10, r11, r12], &(0x7f00000009c0)=[{0x5, 0x1, 0x10, 0x3}, {0x3, 0x2, 0xe, 0x2}], 0x10, 0x7}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r12, 0xffffffffffffffff, r7, 0xffffffffffffffff, r9, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 00:01:16 executing program 1: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) 00:01:16 executing program 3: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) 00:01:16 executing program 2: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) 00:01:16 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:16 executing program 3: rt_sigqueueinfo(0x0, 0x6, &(0x7f0000004d40)={0x0, 0x0, 0x7f}) 00:01:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r4, 0xffffffffffffffff, r2, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) [ 76.885891][ C1] ------------[ cut here ]------------ [ 76.888094][ C1] WARNING: CPU: 1 PID: 10972 at kernel/workqueue.c:1728 __queue_work+0xdb8/0x12bc [ 76.890668][ C1] Modules linked in: [ 76.891713][ C1] CPU: 1 PID: 10972 Comm: syz-executor.3 Not tainted 6.8.0-rc7-syzkaller-g707081b61156 #0 [ 76.894403][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 76.897144][ C1] pstate: 004000c5 (nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 76.899278][ C1] pc : __queue_work+0xdb8/0x12bc [ 76.900650][ C1] lr : __queue_work+0xdb8/0x12bc [ 76.901997][ C1] sp : ffff800080017b70 [ 76.903140][ C1] x29: ffff800080017bb0 x28: 1fffe0001a0273c1 x27: dfff800000000000 [ 76.905324][ C1] x26: dfff800000000000 x25: ffff0000d5401800 x24: 0000000000000008 [ 76.907440][ C1] x23: ffff0000d54019c0 x22: ffff0000d0139e08 x21: 0000000000000100 [ 76.909584][ C1] x20: ffff0000d0139e00 x19: ffff0000f45b4c10 x18: 0000000000000000 [ 76.911757][ C1] x17: ffff800125436000 x16: ffff80008ad6b09c x15: 0000000000000002 [ 76.914000][ C1] x14: ffff80008eca0458 x13: dfff800000000000 x12: 00000000ebeaf0ff [ 76.916162][ C1] x11: 0000000093ec143c x10: 0000000000ff0100 x9 : 0000000000000000 [ 76.918292][ C1] x8 : ffff0000d0139e00 x7 : ffff80008042755c x6 : 0000000000000000 [ 76.920446][ C1] x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff80008d4611c0 [ 76.922656][ C1] x2 : ffff0000f45b4c10 x1 : 0000000000000100 x0 : 0000000000000000 [ 76.924886][ C1] Call trace: [ 76.925760][ C1] __queue_work+0xdb8/0x12bc [ 76.927017][ C1] delayed_work_timer_fn+0x74/0x90 [ 76.928379][ C1] call_timer_fn+0x19c/0x8d4 [ 76.929628][ C1] __run_timers+0x57c/0x6fc [ 76.930907][ C1] run_timer_softirq+0x7c/0x114 [ 76.932247][ C1] __do_softirq+0x2d8/0xce4 [ 76.933469][ C1] ____do_softirq+0x14/0x20 [ 76.934720][ C1] call_on_irq_stack+0x24/0x4c [ 76.936009][ C1] do_softirq_own_stack+0x20/0x2c [ 76.937339][ C1] __irq_exit_rcu+0x1d8/0x434 [ 76.938570][ C1] irq_exit_rcu+0x14/0x84 [ 76.939746][ C1] el1_interrupt+0x38/0x68 [ 76.940952][ C1] el1h_64_irq_handler+0x18/0x24 [ 76.942218][ C1] el1h_64_irq+0x64/0x68 [ 76.943312][ C1] __find_get_block+0x3b0/0xdc4 [ 76.944617][ C1] bdev_getblk+0x4c/0x69c [ 76.945795][ C1] ext4_read_inode_bitmap+0x1ec/0x106c [ 76.947252][ C1] __ext4_new_inode+0xd78/0x39a0 [ 76.948599][ C1] ext4_symlink+0x328/0x9bc [ 76.949829][ C1] vfs_symlink+0x138/0x260 [ 76.951004][ C1] do_symlinkat+0x1bc/0x45c [ 76.952205][ C1] __arm64_sys_symlinkat+0xa4/0xbc [ 76.953598][ C1] invoke_syscall+0x98/0x2b8 [ 76.954825][ C1] el0_svc_common+0x130/0x23c [ 76.956109][ C1] do_el0_svc+0x48/0x58 [ 76.957275][ C1] el0_svc+0x54/0x168 [ 76.958346][ C1] el0t_64_sync_handler+0x84/0xfc [ 76.959703][ C1] el0t_64_sync+0x190/0x194 [ 76.960885][ C1] irq event stamp: 733 [ 76.961954][ C1] hardirqs last enabled at (732): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 76.964749][ C1] hardirqs last disabled at (733): [] _raw_spin_lock_irq+0x28/0x70 [ 76.967304][ C1] softirqs last enabled at (506): [] local_bh_enable+0x10/0x34 [ 76.969851][ C1] softirqs last disabled at (715): [] ____do_softirq+0x14/0x20 [ 76.972267][ C1] ---[ end trace 0000000000000000 ]--- 00:01:16 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:17 executing program 3: getpid() openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) 00:01:17 executing program 4: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) 00:01:17 executing program 2: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) 00:01:17 executing program 1: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) [ 77.077334][ T6204] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 77.084897][ T6204] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 77.098846][ T6204] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 00:01:17 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) [ 77.135953][ T6204] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 77.141341][ T6204] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 77.143946][ T6204] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 00:01:17 executing program 3: rt_sigqueueinfo(0x0, 0x6, &(0x7f0000004d40)) 00:01:17 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x0, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:17 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 00:01:17 executing program 4: rt_sigqueueinfo(0x0, 0x6, &(0x7f0000004d40)) 00:01:17 executing program 1: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x0, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:17 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) 00:01:17 executing program 3: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) 00:01:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 00:01:17 executing program 4: openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 77.588024][T10978] chnl_net:caif_netlink_parms(): no params data found 00:01:17 executing program 3: rt_sigqueueinfo(0x0, 0x6, &(0x7f0000004d40)) 00:01:17 executing program 2: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:01:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 00:01:17 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x0, 0x40, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:17 executing program 3: openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) 00:01:17 executing program 2: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) 00:01:17 executing program 1: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:01:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r4, 0xffffffffffffffff, r2, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 00:01:17 executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:17 executing program 4: openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) 00:01:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xd, 0x4000, 0x7fffffff, 0x5, 0x12, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r4, 0xffffffffffffffff, r2, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 00:01:17 executing program 1: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 00:01:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r4, 0xffffffffffffffff, r2, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) 00:01:17 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) [ 77.969512][T10978] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.986960][T10978] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.996485][T10978] bridge_slave_0: entered allmulticast mode [ 78.004319][T10978] bridge_slave_0: entered promiscuous mode [ 78.025949][T10978] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.027874][T10978] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.037816][T10978] bridge_slave_1: entered allmulticast mode 00:01:18 executing program 4: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) read$alg(0xffffffffffffffff, &(0x7f0000000ac0)=""/42, 0x2a) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{r6, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r9 = memfd_secret(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@bloom_filter={0x1e, 0x1, 0x4, 0x80000001, 0x40, 0x1, 0x200, '\x00', r2, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001fc0)={0x11, 0x12, &(0x7f0000000c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x0, 0x1, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x4, 0x0, 0x0, 0x4, 0x3, 0xfffffffffffffff4, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x59}]}, &(0x7f0000000d00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000d40)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001d40)={0x0, 0x0, 0x80000001, 0x3}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001f00)=[r10, r1, 0xffffffffffffffff, r11, r12, r7], &(0x7f0000001f40)=[{0x8, 0x3, 0x3}, {0x3, 0x5, 0x6}, {0x2, 0x3, 0xb, 0xb}, {0x5, 0x1, 0x1, 0x4}, {0x2, 0x5, 0x7, 0x1}, {0x1, 0x5, 0xf, 0xb}], 0x10, 0x81}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x20, '\x00', r2, r9, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x18, 0x14, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3f}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x6, 0x5, 0x0, 0x3f, 0xfe}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000002140)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002280)=[r3, r12, r13, r3], &(0x7f00000022c0)=[{0x5, 0x3, 0x7}, {0x1, 0x7, 0x0, 0x8}, {0x0, 0x1, 0xd, 0x6}, {0x1, 0x1, 0x6, 0x9}, {0x0, 0x3, 0xc}], 0x10, 0xffffffff}, 0x90) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000002400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000027c0)={&(0x7f0000002540)={0x248, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @ETHTOOL_A_WOL_MODES={0x100, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%pK \x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '-@%&\'(&}($\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x7f, 0x5, "8c539e4dc0b56c04ef9be515f0679f138baef45be3293ac258c61f38b26a5795c13864967d814cfd4f0e2088a99110a27624c811b62238da61fe21f15dbfea6976cb6730289c119875ac2c607dbee82ee484d466e0c6b2d06a4e8bde9659678f5ce2ddf1e68a5fbb219ab73351d60c48ad2c00944b104f883bac84"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xad, 0x3, "d8563de402c3b641f2f250023367e7e7f3f56150cb522d7b52d32028c217543721883bbca0853945d57e7bdf5d169473e9462a0829d882e7ed454ea106d98626a1c5528e657555554483128fda37ef3b06a36eb18c1e92f5a99a876dadb278d7d1b4784966034b5963a7d645bd40cc1c436f3a2bcb582cca6f8ffd597095cecc0084d80cd3b4a315217939bf9f93d44f9b03bb2f1894dd8589e2f02cb7b8a4c67cbe3fb72e31b2338b"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x40004}, 0x40000) r14 = memfd_secret(0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r13], 0x0, 0x10, 0x6}, 0x90) 00:01:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x81, 0x9, 0xff, 0x414, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1}, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x7ff, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002e80)={0x6, 0x16, &(0x7f00000029c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x586eff5c}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_val={0x18, 0xb3a812af7b3d2d51, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x1, 0x2, 0x8, 0xb, 0x18, 0xd}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xcc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002a80)='GPL\x00', 0x100, 0x93, &(0x7f0000002ac0)=""/147, 0x41000, 0x41, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002b80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000002bc0)={0x0, 0x9, 0xfff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r3, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x6}, 0x90) [ 78.065913][T10978] bridge_slave_1: entered promiscuous mode 00:01:18 executing program 3: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) 00:01:18 executing program 1: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) 00:01:18 executing program 4: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x4, 0xffff, 0x3, 0xa4, 0x800, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x1, 0x3f, 0x3, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @multicast1}, 0x1, 0x0, 0x8001, 0x1}}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x2, 0x4, 0x3}, 0x48) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) r5 = socket$netlink(0x10, 0x3, 0x15) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000400)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r5, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)={0x1cc, r6, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x801}, 0x890) ptrace$pokeuser(0x6, r0, 0x0, 0x7) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x5c, 0xa, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8001}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xea}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xfffffff7}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0xd886024ba4cd2815) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000880), r5) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x58, r10, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x40) r11 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000009c0), 0x2002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r11, 0x40045402, &(0x7f0000000a00)=0x1) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000ac0)={'syztnl1\x00', &(0x7f0000000a40)={'syztnl0\x00', r9, 0x4, 0x6, 0x6, 0x100, 0x0, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x40, 0x217, 0x7fff}}) ioctl$sock_inet6_SIOCDIFADDR(r12, 0x8936, &(0x7f0000000b00)={@local, 0x66, r8}) setsockopt$sock_timeval(r12, 0x1, 0x43, &(0x7f0000000b40)={0x77359400}, 0x10) sendmsg$NFNL_MSG_ACCT_NEW(r5, &(0x7f0000000c80)={&(0x7f0000000b80), 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x68, 0x0, 0x7, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x800}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7fffffffffffffff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x2}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004}, 0x60000004) sendmsg$ETHTOOL_MSG_FEATURES_SET(r12, &(0x7f0000001100)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000010c0)={&(0x7f0000000d00)={0x39c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1dc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x71, 0x5, "993b2fd1edf49e5cebb083f4e355638e8e174f4e93234c35563a33f559e1ed06cb8be710d220871152bb0c9dfdf23b37e284e8c75e4e7b26b40bc323c784f87cfcbb80c7ef7ecd1312cfd7b6b9ed15f53f6b5a95ff5fea503c3e279390d348020fbad2b4f9dd4f0180422f7383"}, @ETHTOOL_A_BITSET_BITS={0x164, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'l2tp\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x24e0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1d7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '$\'$(},\'\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xff\xff'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*#\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, 'batadv\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "43b3fa09b8da977c3faf91a10d2479d43dc7dec723f56c8bf688ddc486e18be4ccec94e716f5de6ebfac3aa979606d7eb76df2f56eb861762139ce7a9799ebfd38d129d7184aad83a349864834f6254cfa8a67d7e877d045395323a8e5e5566711e27628f22dd3c99d4529cd32"}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_WANTED={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x110, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2122}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf56}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x3a, 0x5, "2a015ba3e3a3912bff309a0843db7c4f017478e610faa4e2a2afe4dd3e7ff6ab88a21c2bb048a1239cd82e6b673003da302b0e07032c"}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x4}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}]}, 0x39c}, 0x1, 0x0, 0x0, 0x40040c4}, 0x40000) write$smack_current(0xffffffffffffffff, &(0x7f0000001180)={'+%/!]/!['}, 0x9) 00:01:18 executing program 2: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x3}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x