0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) 15:52:42 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) 15:52:42 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r7 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r7, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r8, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:42 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:52:43 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) 15:52:43 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:52:44 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:44 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) socket$packet(0x11, 0x3, 0x300) 15:52:45 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) socket$packet(0x11, 0x3, 0x300) 15:52:45 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r7 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r7, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:45 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:52:45 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) socket$packet(0x11, 0x3, 0x300) 15:52:45 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) [ 71.143734][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.150329][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 [ 71.158570][ T13] cfg80211: failed to load regulatory.db 15:52:46 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) socket$packet(0x11, 0x3, 0x300) 15:52:46 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:52:47 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:52:47 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r7 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r7, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:47 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:48 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:52:48 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) socket$packet(0x11, 0x3, 0x300) 15:52:48 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:52:48 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:48 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r7 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r7, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:49 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:52:50 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:50 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:52:50 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:52:50 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:52:51 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r7 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r7, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:51 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:51 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:52:51 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:52:51 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:52:52 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:52 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:52:52 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:52:52 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r7 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r7, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:52 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:52:54 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:55 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:52:55 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:52:56 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:57 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:52:57 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r7 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r7, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:57 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:52:58 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:52:58 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:58 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:52:59 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) socket$packet(0x11, 0x3, 0x300) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:52:59 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:00 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:01 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:02 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 89.731689][ T4441] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:53:04 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 90.014215][ T4441] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.678387][ T4441] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:53:06 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 92.043327][ T4441] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:53:08 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:09 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:11 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:12 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:14 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:15 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:16 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:17 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:18 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:18 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:19 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 105.741533][ T4753] chnl_net:caif_netlink_parms(): no params data found 15:53:20 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 106.180276][ T21] Bluetooth: hci1: command 0x0409 tx timeout 15:53:21 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 107.150197][ T1281] Bluetooth: hci3: command 0x0409 tx timeout 15:53:22 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 107.819164][ T4759] chnl_net:caif_netlink_parms(): no params data found [ 108.260756][ T21] Bluetooth: hci1: command 0x041b tx timeout 15:53:23 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:23 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 109.225478][ T3562] Bluetooth: hci3: command 0x041b tx timeout 15:53:24 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 110.340459][ T21] Bluetooth: hci1: command 0x040f tx timeout [ 110.367513][ T4753] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.381264][ T4753] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.389355][ T4753] device bridge_slave_0 entered promiscuous mode [ 110.470309][ T4753] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.477392][ T4753] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.485979][ T4753] device bridge_slave_1 entered promiscuous mode 15:53:25 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 111.300224][ T21] Bluetooth: hci3: command 0x040f tx timeout 15:53:26 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 112.420295][ T3560] Bluetooth: hci1: command 0x0419 tx timeout [ 113.381467][ T3562] Bluetooth: hci3: command 0x0419 tx timeout 15:53:28 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 113.837955][ T4753] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 15:53:28 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:28 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:53:28 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) [ 114.731418][ T4759] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.738501][ T4759] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.763478][ T4759] device bridge_slave_0 entered promiscuous mode [ 114.777325][ T4753] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:53:29 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 115.774752][ T4759] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.808809][ T4759] bridge0: port 2(bridge_slave_1) entered disabled state 15:53:30 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 115.827729][ T4759] device bridge_slave_1 entered promiscuous mode 15:53:31 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 117.468019][ T4658] syz-executor.3 (4658) used greatest stack depth: 18520 bytes left [ 117.542180][ T21] Bluetooth: hci0: command 0x0409 tx timeout 15:53:32 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 117.790216][ T3622] Bluetooth: hci4: command 0x0409 tx timeout 15:53:32 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:33 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 119.220921][ T4880] cgroup: fork rejected by pids controller in /syz3 [ 119.630418][ T3609] Bluetooth: hci0: command 0x041b tx timeout [ 119.693818][ T4753] team0: Port device team_slave_0 added [ 119.709022][ T4753] team0: Port device team_slave_1 added [ 119.732250][ T4759] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 119.860237][ T3609] Bluetooth: hci4: command 0x041b tx timeout 15:53:34 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 120.531345][ T4759] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 120.559851][ T4753] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 120.570886][ T4753] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 120.620517][ T4753] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 120.705699][ T4757] syz-executor.3 (4757) used greatest stack depth: 18104 bytes left 15:53:35 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 121.700764][ T3622] Bluetooth: hci0: command 0x040f tx timeout 15:53:36 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 121.950192][ T3623] Bluetooth: hci4: command 0x040f tx timeout 15:53:37 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 122.947167][ T4753] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 122.962959][ T4753] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 123.006199][ T4753] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 123.028900][ T4759] team0: Port device team_slave_0 added [ 123.039216][ T4759] team0: Port device team_slave_1 added 15:53:37 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 123.790392][ T3609] Bluetooth: hci0: command 0x0419 tx timeout [ 124.030314][ T3609] Bluetooth: hci4: command 0x0419 tx timeout 15:53:38 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 124.614596][ T4759] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 124.625237][ T4759] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 124.698069][ T4759] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 124.870128][ T4753] device hsr_slave_0 entered promiscuous mode [ 124.881529][ T4753] device hsr_slave_1 entered promiscuous mode [ 124.894116][ T4753] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 124.912283][ T4753] Cannot create hsr debugfs directory [ 124.987211][ T4759] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 125.004888][ T4759] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 125.089283][ T4759] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:53:40 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 126.568844][ T4441] device hsr_slave_0 left promiscuous mode [ 126.580547][ T4441] device hsr_slave_1 left promiscuous mode 15:53:41 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 126.759704][ T4441] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 126.770219][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 126.801977][ T4441] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 126.809409][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 126.959803][ T4441] device bridge_slave_1 left promiscuous mode [ 126.970624][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.015240][ T4739] syz-executor.3 (4739) used greatest stack depth: 17760 bytes left 15:53:41 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 127.143982][ T4441] device bridge_slave_0 left promiscuous mode [ 127.151061][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state 15:53:42 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 127.971235][ T4441] device veth1_macvtap left promiscuous mode [ 127.977638][ T4441] device veth0_macvtap left promiscuous mode [ 127.993607][ T4441] device veth1_vlan left promiscuous mode [ 127.999615][ T4441] device veth0_vlan left promiscuous mode 15:53:42 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:43 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:44 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:44 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:44 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:45 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:46 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:46 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, 0x0, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 132.582528][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.588979][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 15:53:47 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, 0x0, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:47 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, 0x0, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:48 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:49 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:50 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:51 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:51 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 137.571891][ T4441] team0 (unregistering): Port device team_slave_1 removed 15:53:52 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 138.055606][ T4441] team0 (unregistering): Port device team_slave_0 removed 15:53:52 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 138.653844][ T4441] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 15:53:53 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 139.260565][ T4441] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 15:53:54 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:54 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:54 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:55 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:56 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:56 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:53:57 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 143.064253][ T4441] bond0 (unregistering): Released all slaves 15:53:57 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 143.839067][ T4759] device hsr_slave_0 entered promiscuous mode [ 143.896527][ T4759] device hsr_slave_1 entered promiscuous mode [ 144.011463][ T4759] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 144.019089][ T4759] Cannot create hsr debugfs directory [ 144.343445][ T4851] chnl_net:caif_netlink_parms(): no params data found 15:53:59 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:00 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 146.206247][ T4843] chnl_net:caif_netlink_parms(): no params data found 15:54:01 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:02 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:03 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:04 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 150.436905][ T4851] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.450176][ T4851] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.458229][ T4851] device bridge_slave_0 entered promiscuous mode [ 150.479378][ T4851] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.486885][ T4851] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.496980][ T4851] device bridge_slave_1 entered promiscuous mode 15:54:05 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 152.083264][ T4851] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 152.093799][ T4843] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.112009][ T4843] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.150450][ T4843] device bridge_slave_0 entered promiscuous mode [ 152.168638][ T4843] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.187746][ T4843] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.211193][ T4843] device bridge_slave_1 entered promiscuous mode 15:54:06 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 152.762590][ T4851] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 152.929305][ T4843] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 15:54:09 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 155.592955][ T4843] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:54:10 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 155.703046][ T4851] team0: Port device team_slave_0 added [ 155.744476][ T4843] team0: Port device team_slave_0 added [ 155.762875][ T4851] team0: Port device team_slave_1 added [ 156.333154][ T4843] team0: Port device team_slave_1 added [ 157.019870][ T4851] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 157.029693][ T4851] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 157.067080][ T4851] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 15:54:11 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:12 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:13 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:13 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:14 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 160.600580][ T4851] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 160.607554][ T4851] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.680188][ T4851] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 160.704937][ T4843] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 160.720141][ T4843] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:54:15 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 160.793637][ T4843] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 15:54:15 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:16 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:17 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 163.168615][ T4843] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 163.178162][ T4843] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.214802][ T4843] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:54:17 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:18 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 164.024674][ T4851] device hsr_slave_0 entered promiscuous mode [ 164.239297][ T4851] device hsr_slave_1 entered promiscuous mode 15:54:18 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 164.670244][ T4851] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 164.678028][ T4851] Cannot create hsr debugfs directory 15:54:19 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x0) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:20 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x0) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:21 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x0) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:22 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:23 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 168.641483][ T4843] device hsr_slave_0 entered promiscuous mode [ 168.660617][ T4843] device hsr_slave_1 entered promiscuous mode [ 168.678311][ T4843] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 168.714758][ T4843] Cannot create hsr debugfs directory 15:54:24 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 170.500464][ T3525] Bluetooth: hci2: command 0x0406 tx timeout 15:54:25 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:25 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:26 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 172.180303][ T3560] Bluetooth: hci5: command 0x0409 tx timeout [ 172.449364][ T4441] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:54:27 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 173.060222][ T3562] Bluetooth: hci6: command 0x0409 tx timeout 15:54:28 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:28 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 173.935564][ T4759] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 174.263651][ T3562] Bluetooth: hci5: command 0x041b tx timeout 15:54:28 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a", 0x5d, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 174.322401][ T4441] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 175.140225][ T3600] Bluetooth: hci6: command 0x041b tx timeout 15:54:29 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 175.702565][ T4759] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 175.865421][ T4441] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 176.340429][ T3600] Bluetooth: hci5: command 0x040f tx timeout 15:54:30 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 177.220734][ T3562] Bluetooth: hci6: command 0x040f tx timeout [ 177.551186][ T4759] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:54:32 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 178.420279][ T3562] Bluetooth: hci5: command 0x0419 tx timeout 15:54:33 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffc", 0x2f, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:33 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffc", 0x2f, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 179.300335][ T3600] Bluetooth: hci6: command 0x0419 tx timeout 15:54:34 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffc", 0x2f, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 180.555588][ T4759] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:54:35 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f09", 0x46, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 181.130865][ T4441] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:54:35 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f09", 0x46, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 181.445019][ T5677] chnl_net:caif_netlink_parms(): no params data found 15:54:36 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f09", 0x46, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 182.322357][ T5656] chnl_net:caif_netlink_parms(): no params data found 15:54:37 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b", 0x52, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 183.116952][ T5677] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.134757][ T5677] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.161138][ T5677] device bridge_slave_0 entered promiscuous mode [ 183.247110][ T5677] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.264194][ T5677] bridge0: port 2(bridge_slave_1) entered disabled state 15:54:37 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b", 0x52, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 183.291948][ T5677] device bridge_slave_1 entered promiscuous mode [ 183.799516][ T3570] Bluetooth: hci0: command 0x0409 tx timeout 15:54:38 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b", 0x52, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 184.020301][ T3562] Bluetooth: hci1: command 0x0409 tx timeout 15:54:38 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 184.751362][ T5677] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.833272][ T5656] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.849360][ T5656] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.859788][ T5656] device bridge_slave_0 entered promiscuous mode 15:54:39 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 185.536554][ T4441] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:54:40 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 185.598652][ T5677] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.841507][ T5656] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.848623][ T5656] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.860188][ T3560] Bluetooth: hci0: command 0x041b tx timeout [ 185.891161][ T5656] device bridge_slave_1 entered promiscuous mode 15:54:40 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b72", 0x53, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 186.047011][ T5655] syz-executor.3 (5655) used greatest stack depth: 17688 bytes left [ 186.106594][ T2665] Bluetooth: hci1: command 0x041b tx timeout 15:54:40 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b72", 0x53, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 186.888041][ T5677] team0: Port device team_slave_0 added 15:54:41 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b72", 0x53, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:41 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b9", 0x56, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 187.940282][ T3560] Bluetooth: hci0: command 0x040f tx timeout [ 188.180363][ T3560] Bluetooth: hci1: command 0x040f tx timeout 15:54:43 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b9", 0x56, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 188.540898][ T4441] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 189.076051][ T5677] team0: Port device team_slave_1 added [ 189.093179][ T5656] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 15:54:44 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b9", 0x56, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 190.023088][ T3562] Bluetooth: hci0: command 0x0419 tx timeout [ 190.260244][ T3562] Bluetooth: hci1: command 0x0419 tx timeout [ 190.293422][ T5656] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 190.336348][ T5864] chnl_net:caif_netlink_parms(): no params data found 15:54:44 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953", 0x57, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:45 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953", 0x57, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 190.903430][ T4441] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 190.952222][ T5677] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 190.959181][ T5677] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 191.000155][ T5677] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 191.014947][ T5656] team0: Port device team_slave_0 added [ 191.054684][ T4441] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 191.349776][ T5677] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 191.361807][ T5677] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 191.403844][ T5677] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 191.429478][ T5656] team0: Port device team_slave_1 added [ 191.445372][ T5878] chnl_net:caif_netlink_parms(): no params data found 15:54:46 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953", 0x57, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 192.624968][ T5656] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 192.644277][ T5656] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 192.680414][ T5656] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 15:54:47 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:47 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 193.643750][ T5677] device hsr_slave_0 entered promiscuous mode [ 193.835346][ T5677] device hsr_slave_1 entered promiscuous mode [ 193.957182][ T5677] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 193.965066][ T5677] Cannot create hsr debugfs directory [ 194.022811][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.029177][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 [ 194.048115][ T5656] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 194.055204][ T5656] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.129866][ T5656] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 194.151095][ T5864] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.158194][ T5864] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.179363][ T5864] device bridge_slave_0 entered promiscuous mode 15:54:49 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:49 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), 0x0, &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 195.325089][ T5864] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.340195][ T5864] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.361427][ T5864] device bridge_slave_1 entered promiscuous mode 15:54:50 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), 0x0, &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:50 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), 0x0, &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 196.807827][ T5656] device hsr_slave_0 entered promiscuous mode 15:54:51 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), 0x0) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 196.991111][ T5656] device hsr_slave_1 entered promiscuous mode [ 197.352399][ T5656] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 197.360018][ T5656] Cannot create hsr debugfs directory [ 197.377484][ T5864] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 15:54:52 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), 0x0) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:52 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), 0x0) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 198.798135][ T5864] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 198.825950][ T5878] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.838220][ T5878] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.861408][ T5878] device bridge_slave_0 entered promiscuous mode 15:54:54 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:55 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 201.429789][ T5878] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.437061][ T5878] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.456518][ T5878] device bridge_slave_1 entered promiscuous mode 15:54:56 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, 0x0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:56 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, 0x0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:54:57 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, 0x0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 203.659134][ T5864] team0: Port device team_slave_0 added 15:54:58 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 204.491778][ T5864] team0: Port device team_slave_1 added [ 204.499731][ T5878] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 15:54:59 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 205.614446][ T5878] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 205.643521][ T5864] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 205.652447][ T5864] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 205.741753][ T5864] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 15:55:00 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 205.980418][ T5864] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 205.987474][ T5864] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 206.050965][ T5864] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 206.084103][ T5878] team0: Port device team_slave_0 added [ 206.874286][ T5878] team0: Port device team_slave_1 added 15:55:01 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 207.752714][ T5864] device hsr_slave_0 entered promiscuous mode 15:55:02 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 208.060923][ T5864] device hsr_slave_1 entered promiscuous mode [ 208.156161][ T5864] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 208.164415][ T5864] Cannot create hsr debugfs directory 15:55:02 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:04 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 209.896786][ T5677] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 210.087976][ T5946] syz-executor.3 (5946) used greatest stack depth: 17432 bytes left [ 210.214308][ T5878] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 210.240312][ T5878] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.290153][ T5878] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 210.312085][ T5878] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 210.330159][ T5878] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.380129][ T5878] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:55:04 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 210.938310][ T5677] netdevsim netdevsim1 netdevsim1: renamed from eth1 15:55:05 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 211.384760][ T5677] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 212.025388][ T5677] netdevsim netdevsim1 netdevsim3: renamed from eth3 15:55:07 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 213.113218][ T5878] device hsr_slave_0 entered promiscuous mode [ 213.190559][ T5878] device hsr_slave_1 entered promiscuous mode [ 213.242867][ T5878] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 213.260195][ T5878] Cannot create hsr debugfs directory 15:55:08 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:09 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 215.190958][ T5656] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 215.232327][ T5656] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 215.506459][ T5656] netdevsim netdevsim2 netdevsim2: renamed from eth2 15:55:10 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 216.178180][ T5656] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 216.338139][ T5677] 8021q: adding VLAN 0 to HW filter on device bond0 15:55:11 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 217.092969][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.103508][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.118963][ T5677] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.160385][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.170044][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.186013][ T3561] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.193143][ T3561] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.212470][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.227923][ T3561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.252106][ T3561] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.259668][ T3561] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.334185][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.344547][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.381356][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.412356][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.430956][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.461481][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.494405][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.521148][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.529637][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.563834][ T5656] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.602205][ T5677] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 217.618039][ T5677] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.650829][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.661038][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.680752][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.714395][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.726520][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.745580][ T5656] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.772577][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.784572][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.810878][ T21] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.817975][ T21] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.850458][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.858494][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.892141][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.900986][ T21] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.908054][ T21] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.940562][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.956280][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.002271][ T5677] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.025320][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.049678][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.058925][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.068092][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.076949][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.101095][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.114440][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 218.122014][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 218.133513][ T5656] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 218.160923][ T5656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 15:55:12 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 218.601520][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.609671][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.632342][ T3560] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.684353][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 218.700891][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 218.764315][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 218.775571][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.813746][ T5677] device veth0_vlan entered promiscuous mode [ 218.821296][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.829329][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.856045][ T5677] device veth1_vlan entered promiscuous mode [ 218.893171][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 218.904223][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 218.920447][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 218.938384][ T5656] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.980756][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 218.989742][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.010959][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.039990][ T5677] device veth0_macvtap entered promiscuous mode [ 219.086162][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 219.097016][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.121018][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.142890][ T5677] device veth1_macvtap entered promiscuous mode [ 219.156543][ T5656] device veth0_vlan entered promiscuous mode [ 219.172429][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 219.181858][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.200577][ T3562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.224774][ T5677] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 219.244914][ T5677] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.280132][ T5677] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 219.300175][ T5677] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.322465][ T5677] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 219.342500][ T5677] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.361803][ T5677] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 219.385909][ T5677] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.422574][ T5677] batman_adv: batadv0: Interface activated: batadv_slave_0 15:55:13 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(0x0, r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 219.438415][ T5677] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 219.448946][ T5677] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.468481][ T5677] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 219.490269][ T5677] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.510183][ T5677] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 219.542951][ T5677] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.560135][ T5677] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 219.580130][ T5677] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.603169][ T5677] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 219.621379][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.657933][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.670902][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.690717][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.710696][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 219.740900][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 219.768463][ T5656] device veth1_vlan entered promiscuous mode [ 219.781199][ T5677] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.789932][ T5677] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.828911][ T5677] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.840133][ T5677] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 15:55:14 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(0x0, r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 220.361191][ T5656] device veth0_macvtap entered promiscuous mode 15:55:15 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(0x0, r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:16 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 221.881843][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 221.920536][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 221.956392][ T5656] device veth1_macvtap entered promiscuous mode [ 221.975674][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 222.008589][ T5656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 222.015556][ T4401] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 222.050235][ T5656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.060064][ T5656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 222.069207][ T4401] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 222.079998][ T5656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.080019][ T5656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 222.080033][ T5656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.080044][ T5656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 222.080056][ T5656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.080782][ T5656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 222.170206][ T5656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.182293][ T5656] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 222.242630][ T2665] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 222.254331][ T2665] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 222.285766][ T2665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 222.313565][ T5656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 222.340324][ T5656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.371419][ T5656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 222.400362][ T5656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.430471][ T5656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 222.460127][ T5656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.469963][ T5656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 222.508788][ T5656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.530449][ T5656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 222.570371][ T5656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.630747][ T5656] batman_adv: batadv0: Interface activated: batadv_slave_1 15:55:17 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:18 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 224.300507][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 224.309259][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 224.359304][ T154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 224.375152][ T154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 224.385098][ T5656] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.409472][ T5656] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.420566][ T5656] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.440135][ T5656] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.460659][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 15:55:19 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:20 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:20 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:20 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:21 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:21 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:21 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) socket$packet(0x11, 0x3, 0x300) [ 227.779803][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 227.810399][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 15:55:22 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:23 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:23 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:23 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:24 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:25 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:25 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 231.272957][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 15:55:26 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) socket$packet(0x11, 0x3, 0x300) 15:55:26 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:26 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:27 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:27 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, 0x0) socket$packet(0x11, 0x3, 0x300) 15:55:28 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:28 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:28 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x0, 0x300) 15:55:29 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:29 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x0, 0x300) 15:55:29 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:30 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x0, 0x300) 15:55:30 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 237.018334][ T6539] chnl_net:caif_netlink_parms(): no params data found 15:55:31 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x0, 0x300) 15:55:32 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) 15:55:32 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x0, 0x300) 15:55:32 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 238.500341][ T21] Bluetooth: hci3: command 0x0409 tx timeout 15:55:33 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x0, 0x300) 15:55:33 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x3, 0x300) [ 238.927403][ T6539] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.939323][ T6539] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.981639][ T6539] device bridge_slave_0 entered promiscuous mode [ 239.012053][ T6539] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.032557][ T6539] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.050842][ T6539] device bridge_slave_1 entered promiscuous mode [ 239.072684][ T5864] netdevsim netdevsim4 netdevsim0: renamed from eth0 15:55:33 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) socket$packet(0x11, 0x3, 0x300) [ 239.241157][ T5864] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 239.263196][ T5864] netdevsim netdevsim4 netdevsim2: renamed from eth2 15:55:34 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:34 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) socket$packet(0x11, 0x3, 0x300) [ 240.580406][ T3565] Bluetooth: hci3: command 0x041b tx timeout 15:55:35 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) socket$packet(0x11, 0x3, 0x300) [ 240.665757][ T5864] netdevsim netdevsim4 netdevsim3: renamed from eth3 15:55:35 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:35 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x0, 0x300) [ 240.846145][ T6539] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 240.881813][ T6539] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:55:35 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x0, 0x300) 15:55:35 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) socket$packet(0x11, 0x0, 0x300) 15:55:35 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 241.294116][ T6539] team0: Port device team_slave_0 added [ 241.374351][ T6539] team0: Port device team_slave_1 added [ 241.394277][ T5878] netdevsim netdevsim0 netdevsim0: renamed from eth0 15:55:36 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:36 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:36 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:37 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 242.661108][ T3622] Bluetooth: hci3: command 0x040f tx timeout 15:55:37 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:37 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:37 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:37 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:38 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:38 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:38 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:38 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:39 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:39 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 244.742053][ T3610] Bluetooth: hci3: command 0x0419 tx timeout 15:55:39 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:39 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:40 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:40 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:40 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 246.334721][ T6539] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 246.355750][ T6539] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 246.464735][ T6539] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 15:55:41 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:41 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:41 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:42 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:42 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:43 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:44 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:44 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 249.940641][ T25] Bluetooth: hci0: command 0x0409 tx timeout [ 250.020362][ T3610] Bluetooth: hci1: command 0x0409 tx timeout 15:55:44 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 250.297526][ T6539] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 250.310276][ T6539] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 250.410366][ T6539] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:55:45 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:45 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:45 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 252.020386][ T2665] Bluetooth: hci0: command 0x041b tx timeout [ 252.100214][ T2665] Bluetooth: hci1: command 0x041b tx timeout 15:55:46 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:46 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:47 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:47 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) getgid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:48 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 254.074982][ T6539] device hsr_slave_0 entered promiscuous mode [ 254.100698][ T2665] Bluetooth: hci0: command 0x040f tx timeout [ 254.180621][ T2665] Bluetooth: hci1: command 0x040f tx timeout 15:55:48 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 254.427495][ T6539] device hsr_slave_1 entered promiscuous mode [ 254.655521][ T6539] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 254.666771][ T6539] Cannot create hsr debugfs directory 15:55:49 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) getgid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:49 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 255.461563][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.467889][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 15:55:50 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) getgid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:50 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 256.189017][ T3560] Bluetooth: hci0: command 0x0419 tx timeout [ 256.261058][ T3560] Bluetooth: hci1: command 0x0419 tx timeout 15:55:51 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) getgid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:51 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:52 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) getgid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:52 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:53 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:53 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) getgid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:53 executing program 3: getgid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 259.340840][ T6539] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:55:54 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 259.659029][ T6832] chnl_net:caif_netlink_parms(): no params data found 15:55:54 executing program 3: getgid() socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:55 executing program 3: getgid() socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:55 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09", 0x2c, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:55 executing program 3: getgid() socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:55:56 executing program 3: getgid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 15:55:56 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09", 0x2c, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:56 executing program 3: getgid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 15:55:56 executing program 3: getgid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) [ 262.604880][ T6539] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 262.659884][ T6829] chnl_net:caif_netlink_parms(): no params data found 15:55:57 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09", 0x2c, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 262.709539][ T6539] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:55:58 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:58 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c92", 0x42, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:58 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:59 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c92", 0x42, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:55:59 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 264.691679][ T6539] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:55:59 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:00 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:00 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c92", 0x42, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:00 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:01 executing program 3: syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:01 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646", 0x4d, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:01 executing program 3: syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 267.174909][ T6832] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.184004][ T6832] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.193864][ T6832] device bridge_slave_0 entered promiscuous mode 15:56:02 executing program 3: syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:02 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646", 0x4d, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:03 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 268.725077][ T6832] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.733002][ T6832] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.751653][ T6832] device bridge_slave_1 entered promiscuous mode [ 269.332269][ T6829] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.339357][ T6829] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.365936][ T6829] device bridge_slave_0 entered promiscuous mode 15:56:03 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:04 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646", 0x4d, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:04 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:04 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b72", 0x53, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:05 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:56:05 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b72", 0x53, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:05 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) [ 271.510354][ T4441] device hsr_slave_0 left promiscuous mode 15:56:06 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:56:06 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b72", 0x53, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 272.030881][ T4441] device hsr_slave_1 left promiscuous mode [ 272.040934][ T4441] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 272.080249][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 272.102383][ T4441] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 272.109852][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 272.369258][ T4441] device bridge_slave_1 left promiscuous mode [ 272.380248][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state 15:56:06 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)) [ 273.352059][ T4441] device bridge_slave_0 left promiscuous mode [ 273.358304][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state 15:56:08 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b9", 0x56, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:08 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)) 15:56:09 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)) 15:56:09 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b9", 0x56, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 275.199949][ T4441] device hsr_slave_0 left promiscuous mode 15:56:09 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), 0x0) [ 275.861130][ T4441] device hsr_slave_1 left promiscuous mode 15:56:10 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), 0x0) [ 276.189347][ T4441] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 276.197191][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_0 15:56:10 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b9", 0x56, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 276.347350][ T4441] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 276.380207][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 276.564672][ T4441] device bridge_slave_1 left promiscuous mode [ 276.571832][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state 15:56:11 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), 0x0) [ 277.153149][ T4441] device bridge_slave_0 left promiscuous mode [ 277.159382][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state 15:56:11 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), 0x0) 15:56:12 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953", 0x57, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:13 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), 0x0) 15:56:13 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953", 0x57, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:13 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), 0x0) [ 279.330394][ T4441] device hsr_slave_0 left promiscuous mode [ 279.499468][ T7159] cgroup: fork rejected by pids controller in /syz1 [ 279.818768][ T4441] device hsr_slave_1 left promiscuous mode 15:56:14 executing program 3: syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), 0x0) [ 280.186564][ T4441] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 280.200216][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_0 15:56:14 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953", 0x57, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 280.427533][ T4441] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 280.452341][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 280.832456][ T4441] device bridge_slave_1 left promiscuous mode [ 280.838777][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state 15:56:15 executing program 3: syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), 0x0) 15:56:15 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)) [ 281.860051][ T4441] device bridge_slave_0 left promiscuous mode [ 281.866302][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state 15:56:16 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0) 15:56:17 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)) [ 283.447444][ T4441] device veth1_macvtap left promiscuous mode [ 283.473021][ T4441] device veth0_macvtap left promiscuous mode [ 283.479116][ T4441] device veth1_vlan left promiscuous mode [ 283.502200][ T4441] device veth0_vlan left promiscuous mode 15:56:18 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:56:18 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:56:18 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:56:19 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:56:19 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), 0x0, &(0x7f0000000340)) 15:56:19 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)) [ 285.951484][ T4441] device veth1_macvtap left promiscuous mode [ 285.957578][ T4441] device veth0_macvtap left promiscuous mode [ 285.983295][ T4441] device veth1_vlan left promiscuous mode [ 285.989146][ T4441] device veth0_vlan left promiscuous mode 15:56:20 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), 0x0, &(0x7f0000000340)) 15:56:20 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:56:21 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), 0x0, &(0x7f0000000340)) 15:56:21 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)) [ 287.397517][ T4441] device veth1_macvtap left promiscuous mode [ 287.410706][ T4441] device veth0_macvtap left promiscuous mode [ 287.416827][ T4441] device veth1_vlan left promiscuous mode [ 287.430449][ T4441] device veth0_vlan left promiscuous mode 15:56:22 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), 0x0) 15:56:23 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), 0x0) 15:56:24 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), 0x0) 15:56:25 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), 0x0, &(0x7f0000000340)) 15:56:25 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), 0x0, &(0x7f0000000340)) 15:56:26 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:56:26 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953", 0x57, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:26 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953", 0x57, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:26 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953", 0x57, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:26 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953", 0x57, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:27 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953", 0x57, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:27 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953", 0x57, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 292.902127][ T4441] team0 (unregistering): Port device team_slave_1 removed [ 293.067469][ T4441] team0 (unregistering): Port device team_slave_0 removed 15:56:27 executing program 1: syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953", 0x57, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 293.349311][ T4441] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 293.380511][ T3560] Bluetooth: hci6: command 0x0406 tx timeout 15:56:27 executing program 1: syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:28 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) [ 293.810630][ T4441] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 15:56:28 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) 15:56:28 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:56:29 executing program 1: syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 294.641218][ T4441] bond0 (unregistering): Released all slaves 15:56:29 executing program 1: syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:29 executing program 1: syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:29 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:56:29 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) 15:56:30 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:56:30 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:56:30 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) 15:56:31 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953", 0x57, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 296.545299][ T4441] team0 (unregistering): Port device team_slave_1 removed 15:56:31 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953", 0x57, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 296.806213][ T4441] team0 (unregistering): Port device team_slave_0 removed [ 296.831534][ T4441] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 296.859414][ T4441] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 15:56:31 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b9", 0x56, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:31 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b72", 0x53, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:32 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 297.680811][ T4441] bond0 (unregistering): Released all slaves 15:56:32 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 300.003841][ T4441] team0 (unregistering): Port device team_slave_1 removed [ 300.772555][ T4441] team0 (unregistering): Port device team_slave_0 removed [ 301.490713][ T4441] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 302.058080][ T4441] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 302.811922][ T4441] bond0 (unregistering): Released all slaves [ 303.210495][ T6829] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.217577][ T6829] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.241265][ T6829] device bridge_slave_1 entered promiscuous mode [ 303.251008][ T6832] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 304.235948][ T6832] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.420314][ T2665] Bluetooth: hci2: command 0x0409 tx timeout [ 304.472168][ T6829] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 15:56:39 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 304.765658][ T6832] team0: Port device team_slave_0 added [ 304.785642][ T6829] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.822757][ T6832] team0: Port device team_slave_1 added 15:56:39 executing program 1: syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 305.057539][ T6829] team0: Port device team_slave_0 added [ 305.092207][ T6829] team0: Port device team_slave_1 added [ 305.098568][ T6832] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 305.110146][ T6832] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:56:39 executing program 1: syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 305.165590][ T6832] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 15:56:39 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) [ 305.400467][ T6832] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 305.407435][ T6832] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 305.460156][ T6832] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 305.481447][ T6829] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 305.488532][ T6829] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 305.570016][ T6829] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 15:56:40 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) [ 305.613418][ T6829] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 305.640907][ T6829] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 305.680291][ T6829] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:56:40 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) [ 305.783092][ T6832] device hsr_slave_0 entered promiscuous mode [ 305.800825][ T6832] device hsr_slave_1 entered promiscuous mode 15:56:40 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) [ 306.254932][ T6829] device hsr_slave_0 entered promiscuous mode [ 306.272769][ T6829] device hsr_slave_1 entered promiscuous mode [ 306.290260][ T6829] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 306.297842][ T6829] Cannot create hsr debugfs directory [ 306.500445][ T2665] Bluetooth: hci2: command 0x041b tx timeout [ 306.579963][ T7308] chnl_net:caif_netlink_parms(): no params data found 15:56:41 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:56:41 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:56:41 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) [ 307.280990][ T7308] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.288303][ T7308] bridge0: port 1(bridge_slave_0) entered disabled state 15:56:41 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) [ 307.321407][ T7308] device bridge_slave_0 entered promiscuous mode [ 307.347521][ T7308] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.355236][ T7308] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.391309][ T7308] device bridge_slave_1 entered promiscuous mode [ 307.406415][ T7332] chnl_net:caif_netlink_parms(): no params data found 15:56:42 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646", 0x4d, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 307.507981][ T7308] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 307.532715][ T7308] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:56:42 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 307.802669][ T7308] team0: Port device team_slave_0 added 15:56:42 executing program 1: syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 307.884690][ T7332] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.910223][ T7332] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.918404][ T7332] device bridge_slave_0 entered promiscuous mode [ 307.937235][ T7308] team0: Port device team_slave_1 added [ 307.981347][ T7332] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.988783][ T7332] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.004726][ T7332] device bridge_slave_1 entered promiscuous mode [ 308.041997][ T7308] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 308.048960][ T7308] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 15:56:42 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c92", 0x42, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 308.100437][ T2665] Bluetooth: hci3: command 0x0409 tx timeout [ 308.130277][ T7308] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 15:56:42 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:42 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 308.314952][ T7308] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 308.330194][ T7308] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 308.394686][ T7308] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 308.458938][ T7332] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 15:56:43 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 308.514655][ T7332] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 308.580386][ T2665] Bluetooth: hci2: command 0x040f tx timeout 15:56:43 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 308.975919][ T7308] device hsr_slave_0 entered promiscuous mode [ 308.995084][ T7308] device hsr_slave_1 entered promiscuous mode 15:56:43 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) [ 309.021548][ T7308] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 309.029136][ T7308] Cannot create hsr debugfs directory [ 309.136101][ T7332] team0: Port device team_slave_0 added [ 309.182093][ T7332] team0: Port device team_slave_1 added 15:56:43 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c92", 0x42, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 309.363801][ T7332] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 309.390204][ T7332] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 309.450192][ T7332] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 309.511282][ T7332] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 309.518240][ T7332] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 309.593600][ T7332] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:56:44 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c92", 0x42, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 309.796336][ T7332] device hsr_slave_0 entered promiscuous mode [ 309.821337][ T7332] device hsr_slave_1 entered promiscuous mode [ 309.837622][ T7332] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 309.850288][ T7332] Cannot create hsr debugfs directory [ 310.180332][ T3562] Bluetooth: hci3: command 0x041b tx timeout 15:56:44 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09", 0x2c, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:45 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 310.660430][ T2665] Bluetooth: hci2: command 0x0419 tx timeout [ 310.764178][ T7392] chnl_net:caif_netlink_parms(): no params data found 15:56:45 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) getgid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 311.043251][ T7392] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.053805][ T7392] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.063073][ T7392] device bridge_slave_0 entered promiscuous mode [ 311.081599][ T7392] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.088679][ T7392] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.150605][ T7392] device bridge_slave_1 entered promiscuous mode 15:56:45 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) getgid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 311.540740][ T7332] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 15:56:46 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) getgid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:56:46 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) getgid() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 311.705347][ T7308] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 311.723985][ T7308] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 311.742842][ T7308] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 311.782666][ T7392] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 15:56:46 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) getgid() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 311.835826][ T7332] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.859602][ T7308] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 311.874975][ T7392] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 311.952251][ T7332] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 312.071719][ T7392] team0: Port device team_slave_0 added 15:56:46 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) getgid() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 312.172349][ T7332] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 312.194472][ T7392] team0: Port device team_slave_1 added [ 312.260283][ T25] Bluetooth: hci0: command 0x0409 tx timeout [ 312.266401][ T25] Bluetooth: hci3: command 0x040f tx timeout 15:56:46 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 312.315442][ T7392] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 312.333518][ T7392] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 312.400329][ T7392] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 312.413735][ T7392] batman_adv: batadv0: Adding interface: batadv_slave_1 15:56:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 312.430217][ T7392] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 312.457327][ T7392] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 312.651999][ T7392] device hsr_slave_0 entered promiscuous mode [ 312.672557][ T7392] device hsr_slave_1 entered promiscuous mode 15:56:47 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 312.697097][ T7392] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 312.715565][ T7392] Cannot create hsr debugfs directory [ 312.793011][ T7308] 8021q: adding VLAN 0 to HW filter on device bond0 15:56:47 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 312.927409][ T7308] 8021q: adding VLAN 0 to HW filter on device team0 [ 313.032191][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 313.040067][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 15:56:47 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:56:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) [ 313.288865][ T7410] chnl_net:caif_netlink_parms(): no params data found [ 313.312821][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 313.325602][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.340914][ T3557] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.347993][ T3557] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.363948][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 313.377347][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 15:56:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) [ 313.390572][ T3557] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.397656][ T3557] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.412462][ T3557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 313.460349][ T3525] Bluetooth: hci1: command 0x0409 tx timeout [ 313.521686][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 313.529678][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 313.544168][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 313.557511][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 15:56:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) [ 313.590234][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 313.598196][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 313.608222][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 313.661060][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 313.680753][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 313.691111][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 313.699702][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 15:56:48 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) getgid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 313.785065][ T7308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 15:56:48 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) getgid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 314.163286][ T7410] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.181120][ T7410] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.189247][ T7410] device bridge_slave_0 entered promiscuous mode [ 314.258488][ T7410] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.268642][ T7410] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.277671][ T7410] device bridge_slave_1 entered promiscuous mode [ 314.340852][ T3557] Bluetooth: hci3: command 0x0419 tx timeout [ 314.346931][ T3557] Bluetooth: hci0: command 0x041b tx timeout 15:56:48 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) getgid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:56:49 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) getgid() socket$inet_udplite(0x2, 0x2, 0x88) [ 314.779241][ T7308] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.841200][ T7410] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 314.868880][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 314.885417][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 314.938511][ T7410] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 314.995024][ T7332] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 315.023281][ T7332] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 315.066736][ T7332] netdevsim netdevsim3 netdevsim2: renamed from eth2 15:56:49 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) 15:56:49 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$inet_udplite(0x2, 0x2, 0x88) 15:56:49 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$inet_udplite(0x2, 0x2, 0x88) 15:56:50 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$inet_udplite(0x2, 0x2, 0x88) [ 315.524762][ T7410] team0: Port device team_slave_0 added [ 315.540354][ T7456] Bluetooth: hci1: command 0x041b tx timeout [ 315.558415][ T7332] netdevsim netdevsim3 netdevsim3: renamed from eth3 15:56:50 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) [ 315.848896][ T7410] team0: Port device team_slave_1 added 15:56:50 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) 15:56:50 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 316.038903][ T7456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 316.048353][ T7456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 316.070875][ T7456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 316.079592][ T7456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 15:56:50 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:50 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) getgid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 316.420624][ T2665] Bluetooth: hci0: command 0x040f tx timeout 15:56:51 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) getgid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:56:51 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) getgid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 316.902054][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.908377][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 15:56:51 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) getgid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 317.336008][ T7410] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 317.350207][ T7410] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.420182][ T7410] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 317.453091][ T7308] device veth0_vlan entered promiscuous mode [ 317.471078][ T7456] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 317.478925][ T7456] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 317.621592][ T3560] Bluetooth: hci1: command 0x040f tx timeout [ 317.652720][ T7410] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 317.659682][ T7410] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.720213][ T7410] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 317.762756][ T7308] device veth1_vlan entered promiscuous mode 15:56:52 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:56:52 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 318.406407][ T7410] device hsr_slave_0 entered promiscuous mode 15:56:53 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 318.495018][ T7410] device hsr_slave_1 entered promiscuous mode [ 318.501288][ T7460] Bluetooth: hci0: command 0x0419 tx timeout 15:56:53 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 318.635101][ T7410] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 318.646813][ T7410] Cannot create hsr debugfs directory [ 318.669795][ T7308] device veth0_macvtap entered promiscuous mode [ 318.693148][ T7456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 318.710940][ T7456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 318.884596][ T7456] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 318.899573][ T7308] device veth1_macvtap entered promiscuous mode [ 318.965298][ T7308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 318.983940][ T7308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 318.997736][ T7308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 319.012575][ T7308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.025137][ T7308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 319.037263][ T7308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.051798][ T7308] batman_adv: batadv0: Interface activated: batadv_slave_0 15:56:53 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 319.082545][ T7457] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 319.112121][ T7457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 319.134426][ T7332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 319.159159][ T7308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 319.180151][ T7308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.190016][ T7308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 319.201196][ T7308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.240222][ T7308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 319.260329][ T7308] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 319.300320][ T7308] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 319.335004][ T7460] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 319.344802][ T7460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 319.379212][ T7392] netdevsim netdevsim0 netdevsim0: renamed from eth0 15:56:53 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) [ 319.504860][ T7308] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.530233][ T7308] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.539092][ T7308] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.570293][ T7308] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.591764][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 319.599678][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.628170][ T7392] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 319.700454][ T7456] Bluetooth: hci1: command 0x0419 tx timeout [ 319.722427][ T7392] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 319.739334][ T7332] 8021q: adding VLAN 0 to HW filter on device team0 15:56:54 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 319.767632][ T7392] netdevsim netdevsim0 netdevsim3: renamed from eth3 15:56:54 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) 15:56:54 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 320.547425][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 320.562870][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.577139][ T3622] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.584257][ T3622] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.617654][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.633519][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.648282][ T3622] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.655421][ T3622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.670448][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 320.686003][ T3622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 15:56:55 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) [ 321.005327][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 321.022635][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 321.041380][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 321.049923][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 321.068196][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 321.088492][ T7332] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 321.111874][ T7332] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 321.151428][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 321.161157][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 321.169660][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 321.188202][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 321.203759][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 321.215109][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 321.282498][ T4401] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 321.298908][ T4401] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 321.345402][ T7457] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 321.369202][ T7392] 8021q: adding VLAN 0 to HW filter on device bond0 [ 321.392027][ T7410] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 321.660350][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 321.667878][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 321.683306][ T7410] netdevsim netdevsim4 netdevsim1: renamed from eth1 15:56:56 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00'}) 15:56:56 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 322.196376][ T7410] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 322.408716][ T7392] 8021q: adding VLAN 0 to HW filter on device team0 [ 322.429180][ T3621] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 322.432467][ T7332] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 322.440295][ T3621] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 322.460967][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.468864][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.490953][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 322.498958][ T7410] netdevsim netdevsim4 netdevsim3: renamed from eth3 15:56:57 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 322.743375][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 322.761994][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.780903][ T3570] bridge0: port 1(bridge_slave_0) entered blocking state 15:56:57 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 322.787996][ T3570] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.810874][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 322.819672][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.847736][ T3570] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.854875][ T3570] bridge0: port 2(bridge_slave_1) entered forwarding state 15:56:57 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:56:57 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:56:58 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) socket$packet(0x11, 0x3, 0x300) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:56:58 executing program 1: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 323.710884][ T1281] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 323.718924][ T1281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 323.751481][ T1281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 323.781012][ T1281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 323.813371][ T1281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 323.834361][ T1281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 323.858401][ T1281] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 323.922360][ T1281] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 323.943378][ T1281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 323.965486][ T1281] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 323.996390][ T7392] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 324.040144][ T7392] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 324.066780][ T7332] device veth0_vlan entered promiscuous mode 15:56:58 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) socket$packet(0x11, 0x3, 0x300) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) [ 324.102891][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 324.111965][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 324.121096][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 324.129618][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 324.138908][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 15:56:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 324.181089][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 324.210540][ T7332] device veth1_vlan entered promiscuous mode [ 324.260442][ T7410] 8021q: adding VLAN 0 to HW filter on device bond0 [ 324.327146][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 324.339568][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 324.381536][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 324.389469][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 324.436322][ T7410] 8021q: adding VLAN 0 to HW filter on device team0 [ 324.472285][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 15:56:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 324.481963][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 324.507484][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 324.548940][ T7332] device veth0_macvtap entered promiscuous mode [ 324.569759][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 324.591630][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 324.600946][ T3565] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.608015][ T3565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.630469][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 324.650723][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 324.670379][ T3565] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.677593][ T3565] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.700477][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 324.727168][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 324.736121][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 324.761871][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 324.779337][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 15:56:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 324.803297][ T7332] device veth1_macvtap entered promiscuous mode 15:56:59 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) socket$packet(0x11, 0x3, 0x300) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) [ 324.871833][ T7392] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 324.878881][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 324.889177][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 324.912072][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 324.943750][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 324.970578][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 324.978143][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 324.988003][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 324.996701][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 325.010962][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 325.023380][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 325.079267][ T7460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 325.111037][ T7460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 325.141504][ T7460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 325.160875][ T7460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 325.203223][ T7410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 325.235463][ T7332] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 325.267554][ T7332] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.308602][ T7332] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 325.347905][ T7332] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.380713][ T7332] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 325.420180][ T7332] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 15:56:59 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 325.430040][ T7332] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 325.470305][ T7332] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.497082][ T7332] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 325.556300][ T7392] device veth0_vlan entered promiscuous mode [ 325.576948][ T7460] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 325.586384][ T7460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 325.630980][ T7460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 325.641641][ T7460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 325.662149][ T7332] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 325.680146][ T7332] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.689991][ T7332] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 325.740429][ T7332] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.760215][ T7332] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 325.790230][ T7332] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.820337][ T7332] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 325.840151][ T7332] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.870418][ T7332] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 325.882170][ T2665] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 15:57:00 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) [ 325.900633][ T2665] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 325.908877][ T2665] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 325.930958][ T2665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 325.952905][ T7392] device veth1_vlan entered promiscuous mode [ 325.965118][ T7332] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 325.982573][ T7332] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 15:57:00 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 326.000280][ T7332] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.009493][ T7332] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.350559][ T7460] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 326.358111][ T7460] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 326.383364][ T7410] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 326.406325][ T7392] device veth0_macvtap entered promiscuous mode 15:57:01 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:01 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 326.991014][ T7457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 327.004621][ T7457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 327.046823][ T7392] device veth1_macvtap entered promiscuous mode 15:57:01 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:01 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 327.163401][ T7460] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 327.187274][ T7392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 327.230188][ T7392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 327.240906][ T7392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 327.270593][ T7392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 327.290275][ T7392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 327.310221][ T7392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 327.321055][ T7392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 327.339918][ T7392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 327.362483][ T7392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 327.381466][ T7392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 327.402697][ T7392] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 327.416459][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 327.426810][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 327.465967][ T7392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 327.486981][ T7392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 327.510738][ T7392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 327.570457][ T7392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 327.609146][ T7392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 327.655347][ T7392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 15:57:02 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, 0x0, 0x20000000) [ 327.706253][ T7392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 327.739995][ T7392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 327.787565][ T7392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 327.812462][ T7392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 327.841754][ T7392] batman_adv: batadv0: Interface activated: batadv_slave_1 15:57:02 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, 0x0, 0x20000000) 15:57:02 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, 0x0, 0x20000000) 15:57:02 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:03 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:03 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 328.720742][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 328.729573][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 328.741042][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 328.770677][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 328.801009][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 328.809064][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 328.835021][ T7392] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 328.847681][ T7392] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 328.876984][ T7392] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 328.885792][ T7392] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 328.973652][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 328.983299][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 329.001057][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.022162][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.040960][ T3623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 329.068501][ T7410] device veth0_vlan entered promiscuous mode [ 329.077880][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 329.091009][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 15:57:03 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:03 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:04 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:04 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:04 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 330.421900][ T7410] device veth1_vlan entered promiscuous mode [ 330.450513][ T7456] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 330.470809][ T7456] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 15:57:05 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:57:05 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:57:05 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:05 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:05 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:57:05 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:57:05 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:57:05 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:05 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:57:06 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:06 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1", 0x58, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:57:06 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x0, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:06 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:57:07 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)) 15:57:07 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) 15:57:07 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) 15:57:07 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 333.532927][ T7410] device veth0_macvtap entered promiscuous mode [ 333.587258][ T2665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 333.600988][ T2665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 333.623235][ T7410] device veth1_macvtap entered promiscuous mode 15:57:08 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:57:08 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) [ 333.656564][ T2665] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 333.664421][ T445] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 333.683371][ T445] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 15:57:08 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 333.745229][ T7410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 333.771008][ T7410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.790321][ T7410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 333.830246][ T7410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.860195][ T7410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 333.880175][ T7410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.890043][ T7410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 333.938749][ T7410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.960838][ T7410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 333.990265][ T7410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.030435][ T7410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 15:57:08 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 334.050152][ T7410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.072001][ T7410] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 334.079416][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 334.087442][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 334.132607][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 334.163963][ T7410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 15:57:08 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 334.186147][ T7410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.220386][ T7410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 15:57:08 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 334.263057][ T7410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.300432][ T7410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 334.360254][ T7410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.380301][ T7410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 334.404988][ T7410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.430246][ T7410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 334.460331][ T7410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.480223][ T7410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 334.530164][ T7410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.592250][ T7410] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 334.605084][ T4671] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 334.617446][ T7460] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 334.635473][ T7460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 334.645414][ T4671] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 15:57:09 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) [ 334.703377][ T7460] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 334.749756][ T7410] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.780219][ T7410] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.789035][ T7410] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 15:57:09 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 334.832807][ T7410] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 15:57:09 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:09 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:09 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:10 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:10 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:10 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:10 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) [ 336.666182][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 336.691080][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 336.691307][ T1201] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 336.700521][ T3610] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 15:57:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) [ 336.765439][ T1201] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 15:57:11 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x1}, 0x14}}, 0x20000000) 15:57:11 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) [ 336.834883][ T21] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 15:57:11 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:11 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:11 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:11 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:11 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:11 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:11 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:11 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:11 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:12 executing program 4: getgid() r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:12 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:12 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:12 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:12 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:12 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:12 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, 0x0, 0x1) 15:57:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, 0x0, 0x20000000) 15:57:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, 0x0, 0x1) 15:57:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, 0x0, 0x1) 15:57:13 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 15:57:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:13 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, 0x0, 0x20000000) 15:57:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={0x0}}, 0x1) 15:57:13 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r3, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={0x0}}, 0x0) 15:57:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={0x0}}, 0x0) 15:57:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={0x0}}, 0x0) 15:57:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, 0x0, 0x20000000) 15:57:14 executing program 1: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 15:57:14 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:14 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r3, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:14 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:15 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:15 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:15 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r3, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:15 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:15 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:16 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 15:57:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:16 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:16 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:17 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 15:57:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:17 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 15:57:17 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:18 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:18 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) 15:57:18 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x1}, 0x14}}, 0x20000000) 15:57:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 15:57:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:22 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:22 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) 15:57:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:22 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) 15:57:23 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 15:57:23 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) 15:57:24 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:26 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) 15:57:26 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) 15:57:26 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:26 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:26 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:26 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:27 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) 15:57:27 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:27 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:27 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:29 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:29 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:29 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:29 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) 15:57:29 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:30 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:30 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) 15:57:31 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:31 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:31 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) 15:57:31 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:31 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:32 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:32 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) 15:57:32 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r7 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r7, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r8, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:32 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:32 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:33 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) 15:57:33 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:34 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:34 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:35 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) 15:57:35 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r7 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r7, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r8, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:35 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r3, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:35 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:35 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r7, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:36 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) 15:57:36 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:36 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r7 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r7, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r8, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:57:37 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 15:57:37 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r3, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:57:37 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) 15:57:38 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 15:57:38 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) 15:57:38 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 364.267254][ T4441] device hsr_slave_0 left promiscuous mode [ 364.466606][ T4441] device hsr_slave_1 left promiscuous mode [ 365.014784][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 365.394793][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 365.527589][ T4441] device bridge_slave_1 left promiscuous mode [ 365.554902][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.103368][ T4441] device bridge_slave_0 left promiscuous mode [ 366.112172][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state 15:57:40 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 15:57:41 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) ptrace$pokeuser(0x6, 0x0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 15:57:42 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) ptrace$pokeuser(0x6, 0x0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 15:57:42 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) ptrace$pokeuser(0x6, 0x0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 368.248325][ T4441] device hsr_slave_0 left promiscuous mode 15:57:43 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 369.000308][ T4441] device hsr_slave_1 left promiscuous mode [ 369.512070][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_0 15:57:44 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 370.111383][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 370.492439][ T4441] device bridge_slave_1 left promiscuous mode [ 370.498753][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state 15:57:45 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 371.584248][ T4441] device bridge_slave_0 left promiscuous mode [ 371.594793][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state 15:57:47 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 373.093218][ T4441] device hsr_slave_0 left promiscuous mode [ 373.850309][ T4441] device hsr_slave_1 left promiscuous mode 15:57:48 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 374.590505][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 374.862161][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_1 15:57:49 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 375.447014][ T4441] device bridge_slave_1 left promiscuous mode [ 375.460234][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state 15:57:51 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 377.524758][ T4441] device bridge_slave_0 left promiscuous mode [ 377.535143][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.342621][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.348958][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 15:57:53 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 379.590657][ T4441] device hsr_slave_0 left promiscuous mode [ 380.098006][ T4441] device hsr_slave_1 left promiscuous mode 15:57:54 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 381.215691][ T4441] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 381.234507][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 381.573728][ T4441] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 381.613242][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_1 15:57:56 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 382.007760][ T4441] device bridge_slave_1 left promiscuous mode [ 382.014263][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.094786][ T4441] device bridge_slave_0 left promiscuous mode [ 383.102272][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state 15:57:58 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 15:58:00 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 15:58:01 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 387.808249][ T4441] device hsr_slave_0 left promiscuous mode 15:58:03 executing program 3: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 388.858572][ T4441] device hsr_slave_1 left promiscuous mode [ 389.595356][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 389.844626][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_1 15:58:04 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 389.934266][ T4441] device bridge_slave_1 left promiscuous mode [ 389.960344][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state 15:58:05 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 390.860728][ T4441] device bridge_slave_0 left promiscuous mode [ 390.866938][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state 15:58:06 executing program 4: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r6 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r6, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:58:06 executing program 2: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r4, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) r6 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000740)={'vcan0\x00'}) r7 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r7, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) socketpair(0x1d, 0x6, 0x7, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r8, 0xc01064c8, &(0x7f0000000880)={0x3, 0x0, &(0x7f0000000840)=[0x0, 0x0, 0x0]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000008c0), 0x10200, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0x98, 0x0, 0xe0da7e9ba3980a0e, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x9, 0x40}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x1}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x9}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6}, @NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xb9}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_HWMP_ROOTMODE={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x9}, @NL80211_MESHCONF_MIN_DISCOVERY_TIMEOUT={0x6, 0xa, 0x7}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x5}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:58:07 executing program 0: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)) getgid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000480)={'syztnl2\x00', r1, 0x8, 0x8f47, 0x3, 0x1, {{0x1f, 0x4, 0x1, 0x8, 0x7c, 0x65, 0x0, 0x80, 0x4, 0x0, @multicast1, @broadcast, {[@cipso={0x86, 0x1f, 0x1, [{0x0, 0x6, "861a45de"}, {0x6, 0x4, "1150"}, {0x6, 0xf, "714c481813f5ef9eb6d0cefb89"}]}, @lsrr={0x83, 0x1b, 0xea, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, @remote, @private=0xa010102, @broadcast]}, @lsrr={0x83, 0x7, 0xfe, [@multicast2]}, @timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0x80000000, 0x5, 0x4]}, @timestamp={0x44, 0x14, 0xdb, 0x0, 0x6, [0x6, 0x1, 0x0, 0x2d]}]}}}}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000580)) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r3, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4000110) socket$packet(0x11, 0x3, 0x300) 15:58:07 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100)) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 15:58:08 executing program 1: getgid() prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r2 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r2, 0x0, 0x8000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) [ 395.481056][ T4441] device hsr_slave_0 left promiscuous mode [ 396.261106][ T7460] Bluetooth: hci4: command 0x0409 tx timeout [ 396.340546][ T7460] Bluetooth: hci5: command 0x0409 tx timeout [ 396.670356][ T3565] Bluetooth: hci7: command 0x0409 tx timeout [ 396.778936][ T4441] device hsr_slave_1 left promiscuous mode 15:58:11 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r1 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r1, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 397.701658][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 397.940271][ T7462] Bluetooth: hci8: command 0x0409 tx timeout [ 398.257748][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 398.340292][ T7462] Bluetooth: hci4: command 0x041b tx timeout [ 398.420362][ T7462] Bluetooth: hci5: command 0x041b tx timeout [ 398.542311][ T4441] device bridge_slave_1 left promiscuous mode [ 398.548537][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.740552][ T7462] Bluetooth: hci7: command 0x041b tx timeout 15:58:13 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 399.606428][ T4441] device bridge_slave_0 left promiscuous mode [ 399.618787][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.664794][ T4441] device hsr_slave_0 left promiscuous mode [ 399.671360][ T4441] device hsr_slave_1 left promiscuous mode [ 399.873954][ T4441] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 399.900246][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 400.020576][ T7460] Bluetooth: hci8: command 0x041b tx timeout [ 400.203045][ T4441] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 400.222619][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 400.420403][ T7462] Bluetooth: hci4: command 0x040f tx timeout [ 400.500559][ T7462] Bluetooth: hci5: command 0x040f tx timeout [ 400.820353][ T7460] Bluetooth: hci7: command 0x040f tx timeout [ 401.097866][ T4441] device bridge_slave_1 left promiscuous mode [ 401.130260][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state 15:58:16 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, 0x0, 0x20000000) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 402.101340][ T7460] Bluetooth: hci8: command 0x040f tx timeout [ 402.222311][ T4441] device bridge_slave_0 left promiscuous mode [ 402.228622][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state [ 402.501525][ T7460] Bluetooth: hci4: command 0x0419 tx timeout [ 402.580682][ T7460] Bluetooth: hci5: command 0x0419 tx timeout [ 402.900238][ T7460] Bluetooth: hci7: command 0x0419 tx timeout [ 404.180332][ T7460] Bluetooth: hci8: command 0x0419 tx timeout [ 404.723834][ T4441] device hsr_slave_0 left promiscuous mode [ 404.733606][ T4441] device hsr_slave_1 left promiscuous mode [ 405.363211][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 405.575269][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 405.764343][ T4441] device bridge_slave_1 left promiscuous mode [ 405.780253][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state 15:58:20 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, 0x0, 0x20000000) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 407.200835][ T4441] device bridge_slave_0 left promiscuous mode [ 407.207061][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.220423][ T4441] device hsr_slave_0 left promiscuous mode [ 409.713484][ T4441] device hsr_slave_1 left promiscuous mode [ 409.935698][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 409.970438][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 409.997826][ T4441] device bridge_slave_1 left promiscuous mode [ 410.050352][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state [ 411.350816][ T4441] device bridge_slave_0 left promiscuous mode [ 411.357024][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.302857][ T4441] device hsr_slave_0 left promiscuous mode [ 413.893494][ T4441] device hsr_slave_1 left promiscuous mode [ 414.574264][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_0 15:58:29 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, 0x0, 0x20000000) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 414.887728][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 415.015719][ T4441] device bridge_slave_1 left promiscuous mode [ 415.042203][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.428329][ T4441] device bridge_slave_0 left promiscuous mode [ 415.437755][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state 15:58:31 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 417.680537][ T4441] device hsr_slave_0 left promiscuous mode [ 418.500721][ T4441] device hsr_slave_1 left promiscuous mode [ 419.382532][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 419.505168][ T4441] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 419.617952][ T4441] device bridge_slave_1 left promiscuous mode [ 419.629709][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.970697][ T4441] device bridge_slave_0 left promiscuous mode [ 419.976999][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state 15:58:35 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 421.880452][ T4441] device veth1_macvtap left promiscuous mode [ 421.886525][ T4441] device veth0_macvtap left promiscuous mode [ 421.900239][ T4441] device veth1_vlan left promiscuous mode [ 421.906055][ T4441] device veth0_vlan left promiscuous mode [ 423.989734][ T4441] device veth1_macvtap left promiscuous mode [ 423.995929][ T4441] device veth0_macvtap left promiscuous mode [ 424.012762][ T4441] device veth1_vlan left promiscuous mode [ 424.018582][ T4441] device veth0_vlan left promiscuous mode [ 426.500458][ T7460] Bluetooth: hci2: command 0x0406 tx timeout 15:58:43 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 431.620380][ T7460] Bluetooth: hci3: command 0x0406 tx timeout 15:58:47 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 436.740308][ T7460] Bluetooth: hci0: command 0x0406 tx timeout [ 436.746399][ T7460] Bluetooth: hci1: command 0x0406 tx timeout [ 439.782482][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.788820][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 15:58:54 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 15:59:04 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xfffffffb}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 453.521497][ T4441] team0 (unregistering): Port device team_slave_1 removed [ 454.201231][ T4441] team0 (unregistering): Port device team_slave_0 removed [ 454.731909][ T4441] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 455.601324][ T4441] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 15:59:12 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 458.331312][ T4441] bond0 (unregistering): Released all slaves [ 462.100210][ T3610] Bluetooth: hci9: command 0x0409 tx timeout [ 462.182719][ T3610] Bluetooth: hci10: command 0x0409 tx timeout [ 462.340671][ T7462] Bluetooth: hci11: command 0x0409 tx timeout [ 463.444573][ T4441] team0 (unregistering): Port device team_slave_1 removed [ 463.870396][ T13] Bluetooth: hci12: command 0x0409 tx timeout [ 464.092120][ T4441] team0 (unregistering): Port device team_slave_0 removed [ 464.180376][ T7460] Bluetooth: hci9: command 0x041b tx timeout [ 464.260243][ T13] Bluetooth: hci10: command 0x041b tx timeout [ 464.430313][ T13] Bluetooth: hci11: command 0x041b tx timeout [ 464.561433][ T4441] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 465.850872][ T4441] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 465.942786][ T13] Bluetooth: hci12: command 0x041b tx timeout [ 466.260288][ T3570] Bluetooth: hci9: command 0x040f tx timeout [ 466.350744][ T3570] Bluetooth: hci10: command 0x040f tx timeout [ 466.500636][ T3570] Bluetooth: hci11: command 0x040f tx timeout 15:59:21 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 468.030437][ T3623] Bluetooth: hci12: command 0x040f tx timeout [ 468.350239][ T3570] Bluetooth: hci9: command 0x0419 tx timeout [ 468.430223][ T3570] Bluetooth: hci10: command 0x0419 tx timeout [ 468.580385][ T3570] Bluetooth: hci11: command 0x0419 tx timeout [ 469.991592][ T4441] bond0 (unregistering): Released all slaves [ 470.110446][ T3610] Bluetooth: hci12: command 0x0419 tx timeout [ 477.538730][ T4441] team0 (unregistering): Port device team_slave_1 removed [ 477.581024][ T4441] team0 (unregistering): Port device team_slave_0 removed [ 477.724861][ T4441] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 478.151287][ T4441] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 480.632990][ T4441] bond0 (unregistering): Released all slaves 15:59:39 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 486.831046][ T4441] team0 (unregistering): Port device team_slave_1 removed [ 487.470915][ T4441] team0 (unregistering): Port device team_slave_0 removed [ 487.931295][ T4441] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 488.730708][ T4441] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 490.770459][ T4441] bond0 (unregistering): Released all slaves [ 494.292116][ T4441] team0 (unregistering): Port device team_slave_1 removed [ 495.201400][ T4441] team0 (unregistering): Port device team_slave_0 removed [ 495.620761][ T4441] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 496.120632][ T4441] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 498.631128][ T4441] bond0 (unregistering): Released all slaves 15:59:54 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 501.222664][ T1376] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.229068][ T1376] ieee802154 phy1 wpan1: encryption failed: -22 15:59:55 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 15:59:56 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x20000000) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 15:59:57 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 504.181864][ T4441] team0 (unregistering): Port device team_slave_1 removed [ 505.221905][ T4441] team0 (unregistering): Port device team_slave_0 removed [ 505.721187][ T4441] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 16:00:00 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) r0 = syz_clone(0x400, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 506.903532][ T4441] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 16:00:04 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) r0 = syz_clone(0x0, &(0x7f0000000200)="b1bf465aa3dcf2da9fa661a58256c9d896b7a4ae63cdedb1728feb76037b2d0338843f16522848e3a5550f09f7dffcfc4bbb3135578761f5ae2295b7a753e4117c929d031f099a30650e0c8646e78ae99a8b724979b953c1e3b16bf79a94e059ea315023e71a082dcbe2c1ad69edcde6b9eeaef3ddce6c0f069b4cf9eeada2003593594301cb4311df43a9b8fe566dc7f4a8915d62bd3d0d94835becb6f2b0889f794aa262ba355df67b367b7dcc0aedf5ea8237a649d04b8048", 0xba, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 510.863337][ T4441] bond0 (unregistering): Released all slaves 16:00:05 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 16:00:06 executing program 3: prctl$PR_GET_ENDIAN(0x13, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)="8fd688c99e7f5e875554f3eb441b183c5babf7df7ab5124ab66f358507fb24667e947828505bd7946a34b270c1783f83247b500af289a8f03eedfde463aff8f51a0f3fd66f0a3f2dfc7d932acf1d22c1c7a7fc556efa0c8bc634a7d492a29cc3fb08624fdadb0c01f7c70c057e3496206a1d7ef35fc9fb66f1e556f756b03de4de527233a6c0e01773c60b0bfdb91cf68ea9fa9c0eb6dc081b3fba9e3bcaaff570b1c6f0b465") ptrace$pokeuser(0x6, r0, 0x0, 0x8000) openat$nci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) [ 514.670343][ T27] INFO: task kworker/1:0:21 blocked for more than 143 seconds. [ 514.678141][ T27] Not tainted 5.15.148-syzkaller #0 [ 514.693946][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 514.722677][ T27] task:kworker/1:0 state:D stack:23584 pid: 21 ppid: 2 flags:0x00004000 [ 514.732991][ T27] Workqueue: events switchdev_deferred_process_work [ 514.739767][ T27] Call Trace: [ 514.760143][ T27] [ 514.763112][ T27] __schedule+0x12c4/0x45b0 [ 514.767737][ T27] ? mark_lock+0x98/0x340 [ 514.780141][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 514.786272][ T27] ? release_firmware_map_entry+0x18b/0x18b [ 514.797211][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 514.803033][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 514.808262][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 514.820199][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 514.825600][ T27] schedule+0x11b/0x1f0 [ 514.829782][ T27] schedule_preempt_disabled+0xf/0x20 [ 514.844471][ T27] __mutex_lock_common+0xe34/0x25a0 [ 514.849714][ T27] ? switchdev_deferred_process_work+0xa/0x20 [ 514.859358][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 514.870277][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 514.876307][ T27] ? print_irqtrace_events+0x210/0x210 [ 514.890125][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 514.896046][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 514.901623][ T27] mutex_lock_nested+0x17/0x20 [ 514.906397][ T27] switchdev_deferred_process_work+0xa/0x20 [ 514.920131][ T27] process_one_work+0x8a1/0x10c0 [ 514.925186][ T27] ? worker_detach_from_pool+0x260/0x260 [ 514.942529][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 514.948111][ T27] ? kthread_data+0x4e/0xc0 [ 514.953081][ T27] ? wq_worker_running+0x97/0x170 [ 514.958119][ T27] worker_thread+0xaca/0x1280 [ 514.970163][ T27] kthread+0x3f6/0x4f0 [ 514.974256][ T27] ? rcu_lock_release+0x20/0x20 [ 515.000135][ T27] ? kthread_blkcg+0xd0/0xd0 [ 515.004764][ T27] ret_from_fork+0x1f/0x30 [ 515.009280][ T27] [ 515.029355][ T27] INFO: task syz-executor.2:8290 blocked for more than 143 seconds. [ 515.062852][ T27] Not tainted 5.15.148-syzkaller #0 [ 515.068596][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 515.079909][ T27] task:syz-executor.2 state:D stack:26624 pid: 8290 ppid: 7308 flags:0x00004006 [ 515.110130][ T27] Call Trace: [ 515.113440][ T27] [ 515.116371][ T27] __schedule+0x12c4/0x45b0 [ 515.127292][ T27] ? release_firmware_map_entry+0x18b/0x18b [ 515.140361][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 515.145879][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 515.156779][ T27] schedule+0x11b/0x1f0 [ 515.165392][ T27] schedule_preempt_disabled+0xf/0x20 [ 515.200148][ T27] __mutex_lock_common+0xe34/0x25a0 [ 515.205414][ T27] ? dev_ioctl+0x598/0xf60 [ 515.209950][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 515.229834][ T27] ? full_name_hash+0x8f/0xe0 [ 515.235005][ T27] mutex_lock_nested+0x17/0x20 [ 515.239794][ T27] dev_ioctl+0x598/0xf60 [ 515.260161][ T27] sock_ioctl+0x68f/0x770 [ 515.264622][ T27] ? sock_poll+0x410/0x410 [ 515.269051][ T27] ? bpf_lsm_file_ioctl+0x5/0x10 [ 515.285173][ T27] ? security_file_ioctl+0x7d/0xa0 [ 515.293089][ T27] ? sock_poll+0x410/0x410 [ 515.297545][ T27] __se_sys_ioctl+0xf1/0x160 [ 515.320174][ T27] do_syscall_64+0x3d/0xb0 [ 515.324911][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 515.333205][ T27] RIP: 0033:0x7ff9250ecda9 [ 515.337750][ T27] RSP: 002b:00007ff92366d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 515.346966][ T27] RAX: ffffffffffffffda RBX: 00007ff92521af80 RCX: 00007ff9250ecda9 [ 515.369222][ T27] RDX: 0000000020000540 RSI: 00000000000089f3 RDI: 0000000000000004 [ 515.400141][ T27] RBP: 00007ff92513947a R08: 0000000000000000 R09: 0000000000000000 [ 515.408150][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 515.419306][ T27] R13: 000000000000000b R14: 00007ff92521af80 R15: 00007ffd34e6e678 [ 515.427652][ T27] [ 515.430945][ T27] INFO: task syz-executor.4:8295 blocked for more than 144 seconds. [ 515.438928][ T27] Not tainted 5.15.148-syzkaller #0 [ 515.445129][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 515.454559][ T27] task:syz-executor.4 state:D stack:26392 pid: 8295 ppid: 7410 flags:0x00004006 [ 515.469264][ T27] Call Trace: [ 515.472839][ T27] [ 515.475775][ T27] __schedule+0x12c4/0x45b0 [ 515.490481][ T27] ? release_firmware_map_entry+0x18b/0x18b [ 515.496404][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 515.510141][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 515.515374][ T27] schedule+0x11b/0x1f0 [ 515.519546][ T27] schedule_preempt_disabled+0xf/0x20 [ 515.530529][ T27] __mutex_lock_common+0xe34/0x25a0 [ 515.535837][ T27] ? dev_ioctl+0x598/0xf60 [ 515.540724][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 515.545943][ T27] ? full_name_hash+0x8f/0xe0 [ 515.551422][ T27] mutex_lock_nested+0x17/0x20 [ 515.556210][ T27] dev_ioctl+0x598/0xf60 [ 515.570170][ T27] sock_ioctl+0x68f/0x770 [ 515.574581][ T27] ? sock_poll+0x410/0x410 [ 515.579022][ T27] ? bpf_lsm_file_ioctl+0x5/0x10 [ 515.584424][ T27] ? security_file_ioctl+0x7d/0xa0 [ 515.589541][ T27] ? sock_poll+0x410/0x410 [ 515.594446][ T27] __se_sys_ioctl+0xf1/0x160 [ 515.599051][ T27] do_syscall_64+0x3d/0xb0 [ 515.603808][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 515.609707][ T27] RIP: 0033:0x7f1af0bb7da9 [ 515.614495][ T27] RSP: 002b:00007f1aef1380c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 515.623458][ T27] RAX: ffffffffffffffda RBX: 00007f1af0ce5f80 RCX: 00007f1af0bb7da9 [ 515.634097][ T27] RDX: 0000000020000540 RSI: 00000000000089f3 RDI: 0000000000000004 [ 515.660129][ T27] RBP: 00007f1af0c0447a R08: 0000000000000000 R09: 0000000000000000 [ 515.668139][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 515.684344][ T27] R13: 000000000000000b R14: 00007f1af0ce5f80 R15: 00007ffe681e03f8 [ 515.710284][ T27] [ 515.713340][ T27] INFO: task syz-executor.0:8309 blocked for more than 144 seconds. [ 515.723677][ T27] Not tainted 5.15.148-syzkaller #0 [ 515.729408][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 515.738462][ T27] task:syz-executor.0 state:D stack:27520 pid: 8309 ppid: 7392 flags:0x00004006 [ 515.750482][ T27] Call Trace: [ 515.753780][ T27] [ 515.757146][ T27] __schedule+0x12c4/0x45b0 [ 515.770170][ T27] ? release_firmware_map_entry+0x18b/0x18b [ 515.776108][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 515.782060][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 515.787273][ T27] schedule+0x11b/0x1f0 [ 515.791797][ T27] schedule_preempt_disabled+0xf/0x20 [ 515.797180][ T27] __mutex_lock_common+0xe34/0x25a0 [ 515.802879][ T27] ? dev_ioctl+0x598/0xf60 [ 515.807315][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 515.812943][ T27] ? full_name_hash+0x8f/0xe0 [ 515.817646][ T27] mutex_lock_nested+0x17/0x20 [ 515.830233][ T27] dev_ioctl+0x598/0xf60 [ 515.834534][ T27] sock_ioctl+0x68f/0x770 [ 515.838883][ T27] ? sock_poll+0x410/0x410 [ 515.843807][ T27] ? bpf_lsm_file_ioctl+0x5/0x10 [ 515.848758][ T27] ? security_file_ioctl+0x7d/0xa0 [ 515.860922][ T27] ? sock_poll+0x410/0x410 [ 515.865372][ T27] __se_sys_ioctl+0xf1/0x160 [ 515.869968][ T27] do_syscall_64+0x3d/0xb0 [ 515.887889][ T27] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 515.894143][ T27] RIP: 0033:0x7fd057bb5da9 [ 515.898572][ T27] RSP: 002b:00007fd0561150c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 515.920162][ T27] RAX: ffffffffffffffda RBX: 00007fd057ce4050 RCX: 00007fd057bb5da9 [ 515.928173][ T27] RDX: 0000000020000540 RSI: 00000000000089f3 RDI: 0000000000000004 [ 515.936531][ T27] RBP: 00007fd057c0247a R08: 0000000000000000 R09: 0000000000000000 [ 515.950127][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 515.958122][ T27] R13: 000000000000006e R14: 00007fd057ce4050 R15: 00007ffecf9b6768 [ 515.980824][ T27] [ 515.983893][ T27] [ 515.983893][ T27] Showing all locks held in the system: [ 515.992041][ T27] 3 locks held by kworker/1:0/21: [ 515.997130][ T27] #0: ffff888011c70d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 516.010125][ T27] #1: ffffc90000db7d20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 516.040171][ T27] #2: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 516.050869][ T27] 1 lock held by khungtaskd/27: [ 516.055722][ T27] #0: ffffffff8c91f220 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 516.070135][ T27] 8 locks held by kworker/u4:2/154: [ 516.075364][ T27] 3 locks held by kworker/0:3/1281: [ 516.090129][ T27] #0: ffff888011c70d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 516.101449][ T27] #1: ffffc9000574fd20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 516.120130][ T27] #2: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 516.129147][ T27] 2 locks held by getty/3258: [ 516.140132][ T27] #0: ffff88814b899098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 516.150007][ T27] #1: ffffc9000250b2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 516.169333][ T27] 3 locks held by kworker/0:5/3565: [ 516.174852][ T27] #0: ffff888011c71d38 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 516.187505][ T27] #1: ffffc900040f7d20 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 516.205219][ T27] #2: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: reg_check_chans_work+0x7f/0xb70 [ 516.220142][ T27] 3 locks held by kworker/0:9/3622: [ 516.225347][ T27] #0: ffff8880238a6938 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 516.240125][ T27] #1: ffffc90004277d20 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 516.257449][ T27] #2: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 [ 516.267789][ T27] 5 locks held by kworker/u4:6/4401: [ 516.280144][ T27] #0: ffff8880147bc938 ((wq_completion)writeback){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 516.291079][ T27] #1: ffffc9000c8e7d20 ((work_completion)(&(&wb->dwork)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 516.323630][ T27] #2: ffff8880249a00e0 (&type->s_umount_key#32){++++}-{3:3}, at: trylock_super+0x1b/0xf0 [ 516.340660][ T27] #3: ffff8880249a2bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 516.360136][ T27] #4: ffff8880249a4990 (jbd2_handle){++++}-{0:0}, at: start_this_handle+0x12b9/0x1570 [ 516.370651][ T27] 5 locks held by kworker/u4:7/4441: [ 516.375953][ T27] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 516.400239][ T27] #1: ffffc9000ec9fd20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 516.412912][ T27] #2: ffffffff8d9cead0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 516.422756][ T27] #3: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0x1ac/0x3f0 [ 516.440134][ T27] #4: ffffffff8c9237e8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x280/0x740 [ 516.452003][ T27] 3 locks held by syz-executor.3/7332: [ 516.457474][ T27] 2 locks held by kworker/1:16/7462: [ 516.469297][ T27] #0: ffff888011c72538 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 516.490190][ T27] #1: ffffc90003177d20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 516.502008][ T27] 1 lock held by syz-executor.1/7600: [ 516.507386][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 516.540136][ T27] 2 locks held by syz-executor.3/8185: [ 516.545672][ T27] 2 locks held by syz-executor.3/8214: [ 516.553662][ T27] 1 lock held by syz-executor.2/8290: [ 516.559058][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: dev_ioctl+0x598/0xf60 [ 516.576996][ T27] 1 lock held by syz-executor.4/8295: [ 516.584747][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: dev_ioctl+0x598/0xf60 [ 516.593813][ T27] 1 lock held by syz-executor.0/8309: [ 516.599190][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: dev_ioctl+0x598/0xf60 [ 516.608310][ T27] 3 locks held by syz-executor.3/8316: [ 516.614143][ T27] 2 locks held by syz-executor.3/8320: [ 516.619611][ T27] 3 locks held by syz-executor.3/8328: [ 516.625441][ T27] 2 locks held by syz-executor.3/8350: [ 516.631156][ T27] 2 locks held by syz-executor.3/8357: [ 516.636621][ T27] 2 locks held by syz-executor.3/8364: [ 516.644306][ T27] #0: ffff8880249a0460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 516.654046][ T27] #1: ffff88805d1953b0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 516.670365][ T27] 2 locks held by syz-executor.3/8372: [ 516.676242][ T27] 2 locks held by syz-executor.3/8378: [ 516.682739][ T27] 2 locks held by syz-executor.3/8386: [ 516.688204][ T27] #0: ffff8880249a0460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 516.697887][ T27] #1: ffff88805d058de8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 516.709538][ T27] 2 locks held by syz-executor.3/8393: [ 516.715649][ T27] #0: ffff8880249a0460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 516.725241][ T27] #1: ffff88805d05abd0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 516.737022][ T27] 2 locks held by syz-executor.3/8400: [ 516.742893][ T27] 3 locks held by syz-executor.3/8406: [ 516.748352][ T27] 3 locks held by syz-executor.3/8412: [ 516.756061][ T27] 3 locks held by syz-executor.3/8426: [ 516.761835][ T27] 2 locks held by syz-executor.3/8432: [ 516.767297][ T27] 2 locks held by syz-executor.3/8439: [ 516.773866][ T27] 2 locks held by syz-executor.3/8444: [ 516.790150][ T27] 2 locks held by syz-executor.3/8447: [ 516.795648][ T27] 1 lock held by syz-executor.4/8452: [ 516.802048][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 516.811774][ T27] 1 lock held by syz-executor.2/8455: [ 516.817151][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 516.827133][ T27] 1 lock held by syz-executor.0/8460: [ 516.840134][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 516.849580][ T27] 1 lock held by syz-executor.1/8464: [ 516.860137][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 516.869579][ T27] 2 locks held by syz-executor.3/8469: [ 516.880133][ T27] 2 locks held by syz-executor.3/8472: [ 516.886038][ T27] 2 locks held by syz-executor.3/8475: [ 516.900136][ T27] #0: ffff8880249a0460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 516.909520][ T27] #1: ffff88803a12a1d8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 516.930165][ T27] 1 lock held by syz-executor.2/8798: [ 516.935561][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 516.945372][ T27] 1 lock held by syz-executor.4/8800: [ 516.959979][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 516.969747][ T27] 1 lock held by syz-executor.0/8802: [ 516.975415][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 516.990125][ T27] 1 lock held by syz-executor.1/8806: [ 516.995518][ T27] #0: ffffffff8d9da688 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 517.013602][ T27] 2 locks held by syz-executor.3/8822: [ 517.019092][ T27] 2 locks held by syz-executor.3/8826: [ 517.030848][ T27] 3 locks held by syz-executor.3/8830: [ 517.040387][ T27] 2 locks held by syz-executor.3/8834: [ 517.045864][ T27] 2 locks held by syz-executor.3/8854: [ 517.077814][ T27] [ 517.091932][ T27] ============================================= [ 517.091932][ T27] [ 517.110132][ T27] NMI backtrace for cpu 0 [ 517.114676][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.148-syzkaller #0 [ 517.122668][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 517.132730][ T27] Call Trace: [ 517.136018][ T27] [ 517.138941][ T27] dump_stack_lvl+0x1e3/0x2cb [ 517.143625][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 517.149276][ T27] ? panic+0x84d/0x84d [ 517.153358][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 517.158572][ T27] nmi_cpu_backtrace+0x46a/0x4a0 [ 517.163516][ T27] ? __wake_up_klogd+0xd5/0x100 [ 517.168413][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 517.174575][ T27] ? _printk+0xd1/0x111 [ 517.178740][ T27] ? panic+0x84d/0x84d [ 517.182808][ T27] ? __wake_up_klogd+0xcc/0x100 [ 517.187670][ T27] ? panic+0x84d/0x84d [ 517.191748][ T27] ? __rcu_read_unlock+0x92/0x100 [ 517.196780][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 517.202915][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 517.208908][ T27] watchdog+0xe72/0xeb0 [ 517.213152][ T27] kthread+0x3f6/0x4f0 [ 517.217220][ T27] ? hungtask_pm_notify+0x50/0x50 [ 517.222245][ T27] ? kthread_blkcg+0xd0/0xd0 [ 517.226846][ T27] ret_from_fork+0x1f/0x30 [ 517.231280][ T27] [ 517.235006][ T27] Sending NMI from CPU 0 to CPUs 1: [ 517.240545][ C1] NMI backtrace for cpu 1 [ 517.240556][ C1] CPU: 1 PID: 6850 Comm: kworker/u4:9 Not tainted 5.15.148-syzkaller #0 [ 517.240572][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 517.240580][ C1] Workqueue: phy20 ieee80211_iface_work [ 517.240679][ C1] RIP: 0010:register_lock_class+0x170/0x9a0 [ 517.240700][ C1] Code: ba 00 00 00 00 00 fc ff df 4c 89 2b 48 c7 c0 c0 7f 3c 91 48 c1 e8 03 0f b6 04 10 84 c0 0f 85 70 06 00 00 83 3d 90 19 da 0f 00 <75> 20 49 8d 5d 48 48 89 d8 48 c1 e8 03 0f b6 04 10 84 c0 0f 85 80 [ 517.240712][ C1] RSP: 0018:ffffc90003507940 EFLAGS: 00000046 [ 517.240724][ C1] RAX: 0000000000000004 RBX: ffffc90003507d28 RCX: ffffffff913c7f03 [ 517.240734][ C1] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffffc90003507d20 [ 517.240745][ C1] RBP: ffffc90003507a10 R08: 0000000000000001 R09: 0000000000000000 [ 517.240753][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 517.240763][ C1] R13: ffffffff8f9241c0 R14: 0000000000000000 R15: 1ffff920006a0f30 [ 517.240773][ C1] FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 517.240785][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 517.240795][ C1] CR2: 00007efc3f1fc988 CR3: 0000000023992000 CR4: 00000000003506e0 [ 517.240808][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 517.240816][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 517.240825][ C1] Call Trace: [ 517.240830][ C1] [ 517.240835][ C1] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 517.240852][ C1] ? read_lock_is_recursive+0x10/0x10 [ 517.240867][ C1] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 517.240889][ C1] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 517.240905][ C1] ? nmi_handle+0xf7/0x370 [ 517.240948][ C1] ? register_lock_class+0x170/0x9a0 [ 517.240964][ C1] ? default_do_nmi+0x62/0x150 [ 517.240980][ C1] ? exc_nmi+0xab/0x120 [ 517.240994][ C1] ? end_repeat_nmi+0x16/0x31 [ 517.241014][ C1] ? register_lock_class+0x170/0x9a0 [ 517.241030][ C1] ? register_lock_class+0x170/0x9a0 [ 517.241046][ C1] ? register_lock_class+0x170/0x9a0 [ 517.241062][ C1] [ 517.241066][ C1] [ 517.241071][ C1] ? read_lock_is_recursive+0x10/0x10 [ 517.241084][ C1] ? is_dynamic_key+0x1f0/0x1f0 [ 517.241098][ C1] ? do_raw_spin_lock+0x14a/0x370 [ 517.241113][ C1] ? mark_lock+0x98/0x340 [ 517.241126][ C1] __lock_acquire+0xd7/0x1ff0 [ 517.241143][ C1] lock_acquire+0x1db/0x4f0 [ 517.241161][ C1] ? process_one_work+0x7d0/0x10c0 [ 517.241178][ C1] ? read_lock_is_recursive+0x10/0x10 [ 517.241191][ C1] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 517.241209][ C1] ? print_irqtrace_events+0x210/0x210 [ 517.241224][ C1] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 517.241239][ C1] ? do_raw_spin_unlock+0x137/0x8b0 [ 517.241252][ C1] ? _raw_spin_unlock_irq+0x1f/0x40 [ 517.241267][ C1] process_one_work+0x7f1/0x10c0 [ 517.241281][ C1] ? process_one_work+0x7d0/0x10c0 [ 517.241300][ C1] ? worker_detach_from_pool+0x260/0x260 [ 517.241316][ C1] ? _raw_spin_lock_irqsave+0x120/0x120 [ 517.241330][ C1] ? kthread_data+0x4e/0xc0 [ 517.241343][ C1] ? wq_worker_running+0x97/0x170 [ 517.241359][ C1] worker_thread+0xaca/0x1280 [ 517.241373][ C1] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 517.241394][ C1] kthread+0x3f6/0x4f0 [ 517.241406][ C1] ? rcu_lock_release+0x20/0x20 [ 517.241420][ C1] ? kthread_blkcg+0xd0/0xd0 [ 517.241433][ C1] ret_from_fork+0x1f/0x30 [ 517.241453][ C1] [ 517.396789][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 517.396806][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.148-syzkaller #0 [ 517.396825][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 517.396835][ T27] Call Trace: [ 517.396842][ T27] [ 517.396849][ T27] dump_stack_lvl+0x1e3/0x2cb [ 517.396876][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 517.396896][ T27] ? panic+0x84d/0x84d [ 517.396921][ T27] panic+0x318/0x84d [ 517.396937][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 517.396958][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 517.396979][ T27] ? fb_is_primary_device+0xcc/0xcc [ 517.396997][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 517.397018][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 517.397037][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 517.397056][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 517.397075][ T27] watchdog+0xeb0/0xeb0 [ 517.397101][ T27] kthread+0x3f6/0x4f0 [ 517.397116][ T27] ? hungtask_pm_notify+0x50/0x50 [ 517.397131][ T27] ? kthread_blkcg+0xd0/0xd0 [ 517.397147][ T27] ret_from_fork+0x1f/0x30 [ 517.397175][ T27] [ 517.397367][ T27] Kernel Offset: disabled [ 517.719472][ T27] Rebooting in 86400 seconds..