0x7f0000000540)={0x1c, 0x13, 0x4, 0x3, 0x70bd2b, 0x25dfdbfb, {0xc, 0x0, 0x9}, [@typed={0x8, 0x16, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) 23:03:00 executing program 4: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) times(&(0x7f00000005c0)) 23:03:00 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) 23:03:00 executing program 0: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000240)=""/206) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) sendmsg$nl_netfilter(r3, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x13, 0x4, 0x3, 0x70bd2b, 0x25dfdbfb, {0xc, 0x0, 0x9}, [@typed={0x8, 0x16, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) 23:03:00 executing program 3: semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(0x0, 0x2, 0x12, &(0x7f0000000100)=""/97) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) semget(0x3, 0x2, 0x202) 23:03:00 executing program 2: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000240)=""/206) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) sendmsg$nl_netfilter(r3, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x13, 0x4, 0x3, 0x70bd2b, 0x25dfdbfb, {0xc, 0x0, 0x9}, [@typed={0x8, 0x16, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r3, 0x89f4, &(0x7f0000000680)={'ip6tnl0\x00', &(0x7f0000000600)={'syztnl1\x00', 0x0, 0x4, 0x3f, 0x9, 0x9c5, 0x14, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x8000, 0x0, 0x1}}) 23:03:13 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) 23:03:13 executing program 4: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) times(&(0x7f00000005c0)) 23:03:13 executing program 0: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000240)=""/206) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:03:13 executing program 2: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000240)=""/206) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) sendmsg$nl_netfilter(r3, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x13, 0x4, 0x3, 0x70bd2b, 0x25dfdbfb, {0xc, 0x0, 0x9}, [@typed={0x8, 0x16, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) 23:03:13 executing program 3: semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(0x0, 0x2, 0x12, &(0x7f0000000100)=""/97) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) semget(0x3, 0x2, 0x202) 23:03:13 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) 23:03:13 executing program 6: r0 = semget(0x2, 0x0, 0x600) semctl$GETPID(r0, 0x4, 0xb, &(0x7f0000000000)=""/57) r1 = semget$private(0x0, 0x2, 0x1) semctl$IPC_INFO(r1, 0x0, 0x3, &(0x7f0000000040)=""/66) r2 = semget(0x0, 0x3, 0x82) semctl$GETZCNT(r2, 0x0, 0xf, &(0x7f00000000c0)=""/43) semctl$SEM_STAT(r0, 0x2, 0x12, &(0x7f0000000100)=""/97) semctl$SETVAL(r2, 0x0, 0x10, &(0x7f0000000180)=0x1) semctl$GETALL(r2, 0x0, 0xd, &(0x7f00000001c0)=""/185) r3 = semget$private(0x0, 0x0, 0xc) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000280)=""/199) semtimedop(r1, &(0x7f0000000380)=[{0x1, 0x8001, 0x1800}, {0x2, 0x80, 0x800}, {0x0, 0x0, 0x1000}, {0x4, 0x1, 0x800}], 0x4, &(0x7f00000003c0)={0x77359400}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 23:03:13 executing program 1: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000240)=""/206) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:03:13 executing program 0: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000240)=""/206) 23:03:13 executing program 4: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) times(&(0x7f00000005c0)) 23:03:13 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) 23:03:13 executing program 3: semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(0x0, 0x2, 0x12, &(0x7f0000000100)=""/97) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) semget(0x3, 0x2, 0x202) 23:03:13 executing program 2: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000240)=""/206) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:03:13 executing program 0: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) 23:03:13 executing program 5: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000240)=""/206) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) sendmsg$nl_netfilter(r3, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x13, 0x4, 0x3, 0x70bd2b, 0x25dfdbfb, {0xc, 0x0, 0x9}, [@typed={0x8, 0x16, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) 23:03:13 executing program 1: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:03:13 executing program 4: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) times(&(0x7f00000005c0)) 23:03:13 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) 23:03:13 executing program 2: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000240)=""/206) 23:03:13 executing program 5: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000240)=""/206) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) sendmsg$nl_netfilter(r3, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x13, 0x4, 0x3, 0x70bd2b, 0x25dfdbfb, {0xc, 0x0, 0x9}, [@typed={0x8, 0x16, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) 23:03:27 executing program 3: semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000100)=""/97) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) semget(0x3, 0x2, 0x202) 23:03:27 executing program 6: r0 = semget(0x2, 0x0, 0x600) semctl$GETPID(r0, 0x4, 0xb, &(0x7f0000000000)=""/57) r1 = semget$private(0x0, 0x2, 0x1) semctl$IPC_INFO(r1, 0x0, 0x3, &(0x7f0000000040)=""/66) r2 = semget(0x0, 0x3, 0x82) semctl$GETZCNT(r2, 0x0, 0xf, &(0x7f00000000c0)=""/43) semctl$SEM_STAT(r0, 0x2, 0x12, &(0x7f0000000100)=""/97) semctl$SETVAL(r2, 0x0, 0x10, &(0x7f0000000180)=0x1) semctl$GETALL(r2, 0x0, 0xd, &(0x7f00000001c0)=""/185) r3 = semget$private(0x0, 0x0, 0xc) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000280)=""/199) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 23:03:27 executing program 5: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000240)=""/206) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) sendmsg$nl_netfilter(r3, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x13, 0x4, 0x3, 0x70bd2b, 0x25dfdbfb, {0xc, 0x0, 0x9}, [@typed={0x8, 0x16, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) 23:03:27 executing program 0: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) 23:03:27 executing program 4: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) times(&(0x7f00000005c0)) 23:03:27 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) 23:03:27 executing program 2: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) 23:03:27 executing program 1: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:03:27 executing program 3: semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) semget(0x3, 0x2, 0x202) 23:03:27 executing program 5: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000240)=""/206) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:03:27 executing program 4: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) times(&(0x7f00000005c0)) 23:03:38 executing program 6: r0 = semget(0x2, 0x0, 0x600) semctl$GETPID(r0, 0x4, 0xb, &(0x7f0000000000)=""/57) r1 = semget$private(0x0, 0x2, 0x1) semctl$IPC_INFO(r1, 0x0, 0x3, &(0x7f0000000040)=""/66) r2 = semget(0x0, 0x3, 0x82) semctl$GETZCNT(r2, 0x0, 0xf, &(0x7f00000000c0)=""/43) semctl$SEM_STAT(r0, 0x2, 0x12, &(0x7f0000000100)=""/97) semctl$SETVAL(r2, 0x0, 0x10, &(0x7f0000000180)=0x1) semctl$GETALL(r2, 0x0, 0xd, &(0x7f00000001c0)=""/185) semget$private(0x0, 0x0, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 23:03:38 executing program 1: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:03:38 executing program 4: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) times(&(0x7f00000005c0)) 23:03:38 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) 23:03:38 executing program 2: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) 23:03:38 executing program 0: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) 23:03:38 executing program 3: semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) semget(0x3, 0x2, 0x202) 23:03:38 executing program 5: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:03:38 executing program 0: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) 23:03:38 executing program 4: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) times(&(0x7f00000005c0)) 23:03:38 executing program 5: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:03:38 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) 23:03:38 executing program 1: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:03:38 executing program 2: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) 23:03:38 executing program 3: semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) semget(0x3, 0x2, 0x202) 23:03:38 executing program 4: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) times(&(0x7f00000005c0)) 23:03:50 executing program 0: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) 23:03:50 executing program 1: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) get_robust_list(r0, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:03:50 executing program 5: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:03:50 executing program 6: r0 = semget(0x2, 0x0, 0x600) semctl$GETPID(r0, 0x4, 0xb, &(0x7f0000000000)=""/57) r1 = semget$private(0x0, 0x2, 0x1) semctl$IPC_INFO(r1, 0x0, 0x3, &(0x7f0000000040)=""/66) r2 = semget(0x0, 0x3, 0x82) semctl$GETZCNT(r2, 0x0, 0xf, &(0x7f00000000c0)=""/43) semctl$SEM_STAT(r0, 0x2, 0x12, &(0x7f0000000100)=""/97) semctl$SETVAL(r2, 0x0, 0x10, &(0x7f0000000180)=0x1) semctl$GETALL(r2, 0x0, 0xd, &(0x7f00000001c0)=""/185) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 23:03:50 executing program 3: semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) semget(0x3, 0x2, 0x202) 23:03:50 executing program 2: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) 23:03:50 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) 23:03:50 executing program 4: times(&(0x7f00000005c0)) 23:03:50 executing program 3: semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) semget(0x3, 0x0, 0x202) 23:03:50 executing program 1: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x2, 0x0) get_robust_list(r0, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:03:50 executing program 4: times(0x0) 23:03:50 executing program 5: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:03:50 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) 23:03:50 executing program 2: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 23:03:50 executing program 0: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000200)) 23:03:50 executing program 4: times(0x0) 23:03:50 executing program 6: r0 = semget(0x2, 0x0, 0x600) semctl$GETPID(r0, 0x4, 0xb, &(0x7f0000000000)=""/57) r1 = semget$private(0x0, 0x2, 0x1) semctl$IPC_INFO(r1, 0x0, 0x3, &(0x7f0000000040)=""/66) r2 = semget(0x0, 0x3, 0x82) semctl$GETZCNT(r2, 0x0, 0xf, &(0x7f00000000c0)=""/43) semctl$SEM_STAT(r0, 0x2, 0x12, &(0x7f0000000100)=""/97) semctl$SETVAL(r2, 0x0, 0x10, &(0x7f0000000180)=0x1) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 23:03:50 executing program 3: semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) semget(0x3, 0x0, 0x0) 23:04:03 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) 23:04:03 executing program 5: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) get_robust_list(r0, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:04:03 executing program 6: r0 = semget(0x2, 0x0, 0x600) semctl$GETPID(r0, 0x4, 0xb, &(0x7f0000000000)=""/57) r1 = semget$private(0x0, 0x2, 0x1) semctl$IPC_INFO(r1, 0x0, 0x3, &(0x7f0000000040)=""/66) r2 = semget(0x0, 0x3, 0x82) semctl$GETZCNT(r2, 0x0, 0xf, &(0x7f00000000c0)=""/43) semctl$SEM_STAT(r0, 0x2, 0x12, &(0x7f0000000100)=""/97) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 23:04:03 executing program 3: semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) semget(0x3, 0x0, 0x0) 23:04:03 executing program 4: times(0x0) 23:04:03 executing program 1: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) get_robust_list(r0, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:04:03 executing program 2: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x2, 0x0) 23:04:03 executing program 0: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000200)) 23:04:03 executing program 5: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x2, 0x0) get_robust_list(r0, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:04:03 executing program 3: semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) semget(0x3, 0x0, 0x0) 23:04:03 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) 23:04:03 executing program 2: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) prctl$PR_SCHED_CORE(0x3e, 0x4, 0x0, 0x2, 0x0) 23:04:03 executing program 0: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 23:04:03 executing program 4: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r0, 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000200)) 23:04:03 executing program 1: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) get_robust_list(0x0, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:04:03 executing program 3: semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) semget(0x3, 0x0, 0x0) 23:04:03 executing program 0: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 23:04:03 executing program 4: times(0x0) 23:04:15 executing program 4: times(0x0) 23:04:15 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) 23:04:15 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 23:04:15 executing program 5: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) get_robust_list(r0, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:04:15 executing program 1: get_robust_list(0x0, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:04:15 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x4, 0x0, 0x2, 0x0) 23:04:15 executing program 3: semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) semget(0x3, 0x0, 0x0) 23:04:15 executing program 6: r0 = semget(0x2, 0x0, 0x600) semctl$GETPID(r0, 0x4, 0xb, &(0x7f0000000000)=""/57) r1 = semget$private(0x0, 0x2, 0x1) semctl$IPC_INFO(r1, 0x0, 0x3, &(0x7f0000000040)=""/66) r2 = semget(0x0, 0x3, 0x82) semctl$GETZCNT(r2, 0x0, 0xf, &(0x7f00000000c0)=""/43) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 23:04:15 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) 23:04:15 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 23:04:15 executing program 7: semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) 23:04:15 executing program 4: times(0x0) 23:04:15 executing program 1: get_robust_list(0x0, 0x0, &(0x7f00000004c0)) 23:04:15 executing program 3: semget$private(0x0, 0x2, 0x0) semget(0x3, 0x0, 0x0) 23:04:15 executing program 5: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) get_robust_list(0x0, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:04:15 executing program 7: semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000480)=0x7fffffff) 23:04:15 executing program 4: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) prctl$PR_SCHED_CORE(0x3e, 0x4, 0x0, 0x2, 0x0) 23:04:28 executing program 2: prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) 23:04:28 executing program 3: semget(0x3, 0x0, 0x0) 23:04:28 executing program 7: semctl$SETVAL(0x0, 0x0, 0x10, 0x0) 23:04:28 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 23:04:28 executing program 1: get_robust_list(0x0, 0x0, &(0x7f00000004c0)) 23:04:28 executing program 5: get_robust_list(0x0, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) 23:04:28 executing program 4: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) prctl$PR_SCHED_CORE(0x3e, 0x4, 0x0, 0x2, 0x0) 23:04:28 executing program 6: r0 = semget(0x2, 0x0, 0x600) semctl$GETPID(r0, 0x4, 0xb, &(0x7f0000000000)=""/57) r1 = semget$private(0x0, 0x2, 0x1) semctl$IPC_INFO(r1, 0x0, 0x3, &(0x7f0000000040)=""/66) semget(0x0, 0x3, 0x82) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 23:04:42 executing program 4: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) prctl$PR_SCHED_CORE(0x3e, 0x4, 0x0, 0x2, 0x0) 23:04:42 executing program 6: r0 = semget(0x2, 0x0, 0x600) semctl$GETPID(r0, 0x4, 0xb, &(0x7f0000000000)=""/57) r1 = semget$private(0x0, 0x2, 0x1) semctl$IPC_INFO(r1, 0x0, 0x3, &(0x7f0000000040)=""/66) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 23:04:42 executing program 2: semctl$SETVAL(0x0, 0x0, 0x10, 0x0) 23:04:42 executing program 1: get_robust_list(0x0, 0x0, &(0x7f00000004c0)) 23:04:42 executing program 3: get_robust_list(0x0, 0x0, &(0x7f00000004c0)) 23:04:42 executing program 5: get_robust_list(0x0, 0x0, &(0x7f00000004c0)) 23:04:42 executing program 7: semctl$SETVAL(0x0, 0x0, 0x10, 0x0) 23:04:42 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 23:04:42 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 23:04:42 executing program 1: get_robust_list(0x0, &(0x7f0000000480)=0x0, &(0x7f00000004c0)) 23:04:42 executing program 5: get_robust_list(0x0, 0x0, &(0x7f00000004c0)) 23:04:42 executing program 2: semctl$SETVAL(0x0, 0x0, 0x10, 0x0) 23:04:42 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 23:04:42 executing program 3: get_robust_list(0x0, 0x0, &(0x7f00000004c0)) 23:04:42 executing program 7: semctl$SETVAL(0x0, 0x0, 0x10, 0x0) 23:04:42 executing program 4: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) 23:04:54 executing program 4: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x0) 23:04:54 executing program 7: semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000480)) 23:04:54 executing program 6: r0 = semget(0x2, 0x0, 0x600) semctl$GETPID(r0, 0x4, 0xb, &(0x7f0000000000)=""/57) semget$private(0x0, 0x2, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 23:04:54 executing program 1: get_robust_list(0x0, &(0x7f0000000480)=0x0, 0x0) 23:04:54 executing program 3: get_robust_list(0x0, 0x0, &(0x7f00000004c0)) 23:04:54 executing program 5: get_robust_list(0x0, 0x0, &(0x7f00000004c0)) 23:04:54 executing program 2: semctl$SETVAL(0x0, 0x0, 0x10, 0x0) 23:04:54 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 23:04:54 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) 23:04:54 executing program 3: get_robust_list(0x0, 0x0, 0x0) 23:04:54 executing program 1: get_robust_list(0x0, &(0x7f0000000480)=0x0, 0x0) 23:04:54 executing program 7: get_robust_list(0x0, &(0x7f0000000480)=0x0, 0x0) 23:04:54 executing program 5: get_robust_list(0x0, &(0x7f0000000480)=0x0, &(0x7f00000004c0)) 23:04:54 executing program 4: semctl$SETVAL(0x0, 0x0, 0x10, 0x0) 23:04:54 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 23:04:54 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) 23:04:54 executing program 3: get_robust_list(0x0, 0x0, 0x0) 23:04:54 executing program 1: get_robust_list(0x0, &(0x7f0000000480)=0x0, 0x0) 23:05:05 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) 23:05:05 executing program 6: r0 = semget(0x2, 0x0, 0x600) semctl$GETPID(r0, 0x4, 0xb, &(0x7f0000000000)=""/57) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 23:05:05 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 23:05:05 executing program 4: semctl$SETVAL(0x0, 0x0, 0x10, 0x0) 23:05:05 executing program 5: get_robust_list(0x0, &(0x7f0000000480)=0x0, 0x0) 23:05:05 executing program 1: times(&(0x7f00000005c0)) 23:05:05 executing program 7: get_robust_list(0x0, &(0x7f0000000480)=0x0, 0x0) 23:05:05 executing program 3: get_robust_list(0x0, 0x0, 0x0) 23:05:05 executing program 1: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) 23:05:06 executing program 4: semctl$SETVAL(0x0, 0x0, 0x10, 0x0) 23:05:06 executing program 5: get_robust_list(0x0, &(0x7f0000000480)=0x0, 0x0) 23:05:06 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 23:05:06 executing program 3: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000240)=""/206) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) sendmsg$nl_netfilter(r3, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x13, 0x4, 0x3, 0x70bd2b, 0x25dfdbfb, {0xc, 0x0, 0x9}, [@typed={0x8, 0x16, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r3, 0x89f4, &(0x7f0000000680)={'ip6tnl0\x00', &(0x7f0000000600)={'syztnl1\x00', 0x0, 0x4, 0x3f, 0x9, 0x9c5, 0x14, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x8000, 0x0, 0x1}}) waitid(0x1, r1, 0x0, 0x4, 0x0) pipe2(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) sendmsg$SMC_PNETID_GET(r4, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x1c, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x4) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f0000000940)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000900)={&(0x7f0000000880)={0x4c, r5, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="4b33dfc1b2f0"}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="201fce81f8bb"}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x4c}}, 0x10) 23:05:06 executing program 7: get_robust_list(0x0, &(0x7f0000000480)=0x0, 0x0) 23:05:06 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 23:05:06 executing program 5: get_robust_list(0x0, &(0x7f0000000480)=0x0, 0x0) 23:05:06 executing program 4: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000240)=""/206) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) sendmsg$nl_netfilter(r3, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x13, 0x4, 0x3, 0x70bd2b, 0x25dfdbfb, {0xc, 0x0, 0x9}, [@typed={0x8, 0x16, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r3, 0x89f4, &(0x7f0000000680)={'ip6tnl0\x00', &(0x7f0000000600)={'syztnl1\x00', 0x0, 0x4, 0x3f, 0x9, 0x9c5, 0x14, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x8000, 0x0, 0x1}}) waitid(0x1, r1, 0x0, 0x4, 0x0) pipe2(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) sendmsg$SMC_PNETID_GET(r4, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x1c, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x4) 23:05:06 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) 23:05:19 executing program 6: semget(0x2, 0x0, 0x600) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 23:05:19 executing program 3: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000240)=""/206) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) sendmsg$nl_netfilter(r3, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x13, 0x4, 0x3, 0x70bd2b, 0x25dfdbfb, {0xc, 0x0, 0x9}, [@typed={0x8, 0x16, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r3, 0x89f4, &(0x7f0000000680)={'ip6tnl0\x00', &(0x7f0000000600)={'syztnl1\x00', 0x0, 0x4, 0x3f, 0x9, 0x9c5, 0x14, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x8000, 0x0, 0x1}}) waitid(0x1, r1, 0x0, 0x4, 0x0) pipe2(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) sendmsg$SMC_PNETID_GET(r4, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x1c, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x4) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f0000000940)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000900)={&(0x7f0000000880)={0x4c, r5, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="4b33dfc1b2f0"}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="201fce81f8bb"}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x4c}}, 0x10) 23:05:19 executing program 4: ptrace$peekuser(0x3, 0xffffffffffffffff, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000000c0)={r0, 0x2, r2, 0xb0d3, 0x80000}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a9402, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000200)) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ptrace$getregs(0xe, r1, 0x7, &(0x7f0000000240)=""/206) get_robust_list(r1, &(0x7f0000000480)=&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)}}, &(0x7f00000004c0)=0x18) sendmsg$nl_netfilter(r3, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x13, 0x4, 0x3, 0x70bd2b, 0x25dfdbfb, {0xc, 0x0, 0x9}, [@typed={0x8, 0x16, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r3, 0x89f4, &(0x7f0000000680)={'ip6tnl0\x00', &(0x7f0000000600)={'syztnl1\x00', 0x0, 0x4, 0x3f, 0x9, 0x9c5, 0x14, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20, 0x8000, 0x0, 0x1}}) waitid(0x1, r1, 0x0, 0x4, 0x0) pipe2(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) sendmsg$SMC_PNETID_GET(r4, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x1c, 0x0, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x4) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f0000000940)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000900)={&(0x7f0000000880)={0x4c, r5, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="4b33dfc1b2f0"}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="201fce81f8bb"}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x4c}}, 0x10) 23:05:19 executing program 1: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) pipe2(&(0x7f0000000600), 0x80800) 23:05:19 executing program 2: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) 23:05:19 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000700)={0x0, 0x0, 0xffffffffffffffff, 0x1f}) 23:05:19 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000700)={0x0, 0x0, 0xffffffffffffffff, 0x1f}) 23:05:19 executing program 7: get_robust_list(0x0, 0x0, 0x0) 23:05:19 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000700)={0x0, 0x0, 0xffffffffffffffff, 0x1f}) 23:05:19 executing program 2: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) 23:05:19 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000700)={0x0, 0x0, 0xffffffffffffffff, 0x1f}) 23:05:19 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000700)={0x0, 0x0, 0xffffffffffffffff, 0x1f}) 23:05:19 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000700)={0x0, 0x0, 0xffffffffffffffff, 0x1f}) 23:05:19 executing program 1: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) pipe2(&(0x7f0000000600), 0x80800) 23:05:19 executing program 2: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) 23:05:19 executing program 4: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000700)={0x0, 0x0, 0xffffffffffffffff, 0x1f}) 23:05:19 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 23:05:20 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r4 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r4, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x805) accept(r4, &(0x7f0000001440)=@in={0x2, 0x0, @initdev}, &(0x7f00000014c0)=0x80) sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f00000015c0)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xc35}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000001600), 0x4401, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(r5, 0xc4c03d09, &(0x7f0000001640)={0x13}) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r2, &(0x7f0000001c00)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0xc000000}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x60, 0x1, 0x8, 0x0, 0x0, 0x0, {0xc, 0x0, 0x9}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6cd3db72}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x10001}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x100}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1000}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x10000000}, 0x40000) 23:05:35 executing program 6: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 23:05:35 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000700)={0x0, 0x0, 0xffffffffffffffff, 0x1f}) 23:05:35 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r4 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r4, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x805) accept(r4, &(0x7f0000001440)=@in={0x2, 0x0, @initdev}, &(0x7f00000014c0)=0x80) sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f00000015c0)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xc35}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000001600), 0x4401, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(r5, 0xc4c03d09, &(0x7f0000001640)={0x13}) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r2, &(0x7f0000001c00)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0xc000000}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x60, 0x1, 0x8, 0x0, 0x0, 0x0, {0xc, 0x0, 0x9}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6cd3db72}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x10001}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x100}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1000}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x10000000}, 0x40000) 23:05:35 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 23:05:35 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r4 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r4, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x805) accept(r4, &(0x7f0000001440)=@in={0x2, 0x0, @initdev}, &(0x7f00000014c0)=0x80) sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f00000015c0)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xc35}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000001600), 0x4401, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(r5, 0xc4c03d09, &(0x7f0000001640)={0x13}) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r2, &(0x7f0000001c00)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0xc000000}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x60, 0x1, 0x8, 0x0, 0x0, 0x0, {0xc, 0x0, 0x9}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6cd3db72}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x10001}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x100}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1000}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x10000000}, 0x40000) 23:05:35 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000700)={0x0, 0x0, 0xffffffffffffffff, 0x1f}) 23:05:35 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) r6 = accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80e}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x4010) 23:05:35 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) r6 = accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80e}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x4010) 23:05:35 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f0000000700)={0x0, 0x0, 0xffffffffffffffff, 0x1f}) 23:05:35 executing program 6: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 23:05:35 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 23:05:35 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) pipe2(&(0x7f0000000600), 0x80800) 23:05:35 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) pipe2(&(0x7f0000000600), 0x80800) 23:05:35 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) r6 = accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80e}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x4010) 23:05:35 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 23:05:35 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) 23:05:46 executing program 6: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'batadv_slave_1\x00'}) 23:05:46 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) 23:05:46 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r4 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r4, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x805) accept(r4, &(0x7f0000001440)=@in={0x2, 0x0, @initdev}, &(0x7f00000014c0)=0x80) sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f00000015c0)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xc35}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000001600), 0x4401, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(r5, 0xc4c03d09, &(0x7f0000001640)={0x13}) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r2, &(0x7f0000001c00)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0xc000000}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x60, 0x1, 0x8, 0x0, 0x0, 0x0, {0xc, 0x0, 0x9}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6cd3db72}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x10001}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x100}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1000}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x10000000}, 0x40000) 23:05:46 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) 23:05:46 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) 23:05:46 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) r6 = accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80e}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x4010) 23:05:46 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r4 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r4, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x805) accept(r4, &(0x7f0000001440)=@in={0x2, 0x0, @initdev}, &(0x7f00000014c0)=0x80) sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f00000015c0)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xc35}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000001600), 0x4401, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(r5, 0xc4c03d09, &(0x7f0000001640)={0x13}) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r2, &(0x7f0000001c00)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0xc000000}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x60, 0x1, 0x8, 0x0, 0x0, 0x0, {0xc, 0x0, 0x9}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6cd3db72}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x10001}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x100}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1000}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x10000000}, 0x40000) 23:05:46 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) r6 = accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80e}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x4010) 23:05:46 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) 23:05:46 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) 23:05:46 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 23:05:46 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) 23:05:46 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) 23:05:59 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r4 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r4, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x805) accept(r4, &(0x7f0000001440)=@in={0x2, 0x0, @initdev}, &(0x7f00000014c0)=0x80) sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f00000015c0)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xc35}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000001600), 0x4401, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(r5, 0xc4c03d09, &(0x7f0000001640)={0x13}) 23:05:59 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) r6 = accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80e}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x4010) 23:05:59 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) 23:05:59 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00'}) 23:05:59 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r4 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r4, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x805) accept(r4, &(0x7f0000001440)=@in={0x2, 0x0, @initdev}, &(0x7f00000014c0)=0x80) sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f00000015c0)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xc35}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000001600), 0x4401, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(r5, 0xc4c03d09, &(0x7f0000001640)={0x13}) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r2, &(0x7f0000001c00)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0xc000000}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001b40)={0x60, 0x1, 0x8, 0x0, 0x0, 0x0, {0xc, 0x0, 0x9}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6cd3db72}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x10001}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x100}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1000}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x10000000}, 0x40000) 23:05:59 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 23:05:59 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) 23:05:59 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) 23:06:00 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 23:06:00 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) 23:06:00 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 23:06:00 executing program 6: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) 23:06:00 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) 23:06:00 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) 23:06:00 executing program 6: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) openat$cgroup_pressure(r2, &(0x7f0000000440)='cpu.pressure\x00', 0x2, 0x0) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000480)=0x7fffffff) r3 = accept(r2, &(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) setsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f0000000580)=0x4, 0x4) times(&(0x7f00000005c0)) pipe2(&(0x7f0000000600), 0x80800) 23:06:00 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) r6 = accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80e}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x4010) 23:06:00 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) r6 = accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80e}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x4010) 23:06:00 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r4 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r4, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x805) accept(r4, &(0x7f0000001440)=@in={0x2, 0x0, @initdev}, &(0x7f00000014c0)=0x80) sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f00000015c0)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xc35}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000001600), 0x4401, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(r5, 0xc4c03d09, &(0x7f0000001640)={0x13}) 23:06:00 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r4 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r4, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x805) accept(r4, &(0x7f0000001440)=@in={0x2, 0x0, @initdev}, &(0x7f00000014c0)=0x80) sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f00000015c0)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xc35}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000001600), 0x4401, 0x0) 23:06:13 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r4 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r4, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x805) accept(r4, &(0x7f0000001440)=@in={0x2, 0x0, @initdev}, &(0x7f00000014c0)=0x80) sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f00000015c0)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xc35}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000001600), 0x4401, 0x0) 23:06:13 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r4 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r4, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x805) accept(r4, &(0x7f0000001440)=@in={0x2, 0x0, @initdev}, &(0x7f00000014c0)=0x80) sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f00000015c0)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xc35}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 23:06:13 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00'}) 23:06:13 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/iommu_groups', 0x2, 0x44) 23:06:13 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) 23:06:13 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) 23:06:13 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) r6 = accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80e}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x4010) 23:06:13 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) r6 = accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80e}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x4010) 23:06:13 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000003c0)) 23:06:13 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) 23:06:13 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e21, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x842}}, 0x0, 0x0, 0x2b, 0x0, "47248ef01e5097801baf4ab9759ab763a78c41ae7191d4d1df0f029c0d01ccd6d526b906a57f17700ece9acf27a63dcfd6ac1550ef2be8a2a75a805170011b420b80d1083fcae907176c573cafdb8044"}, 0xd8) 23:06:13 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) r6 = accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80e}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x4010) 23:06:25 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00'}) 23:06:25 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:06:25 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) 23:06:25 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) r6 = accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80e}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x4010) 23:06:25 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r4 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r4, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x805) accept(r4, &(0x7f0000001440)=@in={0x2, 0x0, @initdev}, &(0x7f00000014c0)=0x80) sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f00000015c0)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xc35}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 23:06:25 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:06:25 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r3 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r3, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x805) accept(r3, &(0x7f0000001440)=@in={0x2, 0x0, @initdev}, &(0x7f00000014c0)=0x80) 23:06:25 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) 23:06:25 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) r1 = syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f0000000200)={0x8, "319317958128b91352203d36ab36853690da7ebad45100dc62aa927fbcc62ecd3ea26124ba7136d90874364f5cbbb9d0e538826319f6fbe3003a6466310d0328"}) 23:06:25 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:06:25 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:06:25 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00'}) 23:06:25 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r3 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r3, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x805) 23:06:25 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) syz_open_dev$hidraw(&(0x7f00000001c0), 0x7, 0x200) 23:06:25 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) 23:06:25 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:06:25 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) 23:06:25 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r3 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r3, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x805) accept(r3, &(0x7f0000001440)=@in={0x2, 0x0, @initdev}, &(0x7f00000014c0)=0x80) 23:06:25 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:06:25 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:06:39 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:06:39 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r3 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r3, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) 23:06:39 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) 23:06:39 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:06:39 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) read$eventfd(r4, &(0x7f0000000d40), 0x8) 23:06:39 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) 23:06:39 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r3 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r3, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x3c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x400}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7f}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x805) 23:06:39 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) 23:06:39 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:06:39 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) 23:06:39 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:06:39 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:06:39 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:06:53 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) 23:06:53 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:06:53 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:06:53 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) 23:06:53 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) r3 = accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) sendmsg$NFNL_MSG_ACCT_DEL(r3, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x48, 0x3, 0x7, 0x201, 0x0, 0x0, {0x1}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000084}, 0x40) 23:06:53 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) read$eventfd(r4, &(0x7f0000000d40), 0x8) 23:06:53 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:06:53 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:06:54 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:06:54 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) 23:06:54 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:06:54 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:06:54 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:06:54 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) 23:06:54 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:06:54 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) read$eventfd(r4, &(0x7f0000000d40), 0x8) 23:06:54 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:06:54 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) 23:07:08 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) 23:07:08 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) 23:07:08 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) 23:07:08 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) 23:07:08 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) read$eventfd(r4, &(0x7f0000000d40), 0x8) 23:07:08 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) accept(0xffffffffffffffff, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:07:08 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:07:08 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:07:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:07:08 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) 23:07:09 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) 23:07:09 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) 23:07:09 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:07:09 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:07:09 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) 23:07:09 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) 23:07:09 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) read$eventfd(r4, &(0x7f0000000d40), 0x8) 23:07:09 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) 23:07:09 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:07:09 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) accept(0xffffffffffffffff, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:07:09 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:07:09 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) 23:07:09 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:07:20 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:07:20 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) accept(0xffffffffffffffff, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:07:20 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) 23:07:20 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) 23:07:20 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) 23:07:20 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) 23:07:20 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00), 0x0) 23:07:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 23:07:20 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) 23:07:21 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) read$eventfd(0xffffffffffffffff, &(0x7f0000000d40), 0x8) 23:07:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 23:07:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 23:07:21 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:07:21 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:07:21 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) 23:07:21 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) 23:07:21 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)) read$eventfd(0xffffffffffffffff, &(0x7f0000000d40), 0x8) 23:07:21 executing program 0: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:07:34 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) 23:07:34 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) read$eventfd(0xffffffffffffffff, &(0x7f0000000d40), 0x8) 23:07:34 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:07:34 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:07:34 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) 23:07:34 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) accept(r1, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:07:34 executing program 0: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) read$eventfd(r4, &(0x7f0000000d40), 0x8) 23:07:34 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) 23:07:34 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:07:35 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) 23:07:35 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) 23:07:47 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) read$eventfd(0xffffffffffffffff, &(0x7f0000000d40), 0x8) 23:07:47 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) 23:07:47 executing program 0: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) read$eventfd(r4, &(0x7f0000000d40), 0x8) 23:07:47 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:07:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140), 0x4) 23:07:47 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000c80)=r2, 0x1) 23:07:47 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) accept(r1, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:07:47 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:07:47 executing program 7: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) accept(r1, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:07:47 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:07:47 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) 23:07:47 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000c80)=r2, 0x1) 23:07:47 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000d40), 0x8) 23:07:47 executing program 0: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:08:05 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) 23:08:05 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) read$eventfd(0xffffffffffffffff, &(0x7f0000000d40), 0x8) 23:08:05 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) accept(r1, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:08:05 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000c80)=r2, 0x1) 23:08:05 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:08:05 executing program 7: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) 23:08:05 executing program 0: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c40)={0x2c, 0x0, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x2c}}, 0x400c0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x30, r0, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40880}, 0x24000000) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000001000)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x28, 0x2, 0x2, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x11) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x14, 0x3, 0x2, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000801}, 0x40000) accept(r2, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:08:05 executing program 4: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:08:05 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:08:05 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) read$eventfd(0xffffffffffffffff, &(0x7f0000000d40), 0x8) 23:08:05 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) 23:08:05 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000c80)=r2, 0x1) 23:08:05 executing program 0: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}]}, @NFT_MSG_DELFLOWTABLE={0x2ec, 0x18, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1ac, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xd27}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'dummy0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'veth1_macvtap\x00'}, {0x14, 0x1, 'wlan1\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth0\x00'}, {0x14, 0x1, 'rose0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vcan0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'xfrm0\x00'}, {0x14, 0x1, 'vlan0\x00'}, {0x14}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xcbfe}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syz_tun\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'ip6tnl0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0x10c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'dummy0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth0_to_batadv\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'ip_vti0\x00'}, {0x14, 0x1, 'bond0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'team_slave_1\x00'}, {0x14, 0x1, 'netpci0\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x344}, 0x1, 0x0, 0x0, 0x40}, 0x40000) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) accept(r1, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:08:05 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000780)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1842c00}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3d4, 0xe, 0x7, 0x801, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x7}, [@typed={0x8, 0x24, 0x0, 0x0, @ipv4=@broadcast}, @generic="30b63827a4406d30af557d19901aef57079372b09130178e2a012834a1793fd6aeccd51bed19b9210ae09aa21f76981d90944030a77639ab886175daf00583eef02a72927808c35e8c5ade9dee4b6740677e0aadbb90d51369ca1fb4ff54847454da3f36762bf7df03a1a37b48f6c568e71f1c14426dbb6d148d52539a6180c4e2b4a0804681e9acb6f878f0e9121e8661da043cd07062aa358c67efedd597df7edb29a5296c0c24146ec89e5edcbfff1fc7ad924ac8640a3738f087c05db99c2b1257a449d7e0a81bae3fa69873c10aa9c65086aac51940315d2c396c9db02ba5e19c5db6", @typed={0x4, 0x7d}, @generic="f098cf87b75a60a34f24ce74bf658bc758c46be1dad74dd7c2b40b0151623d8d67c5170ba74cb346c022f67a7503fd0043807f6045e17399117e169d76b636b18651c3959de08fc0141091a7e68bf6de5761f823000fc8c4f9344f25905a2b80995b4d21bcd9e1e961c4c6241a3f44bc774f3004fb2f9bc676e524b4b2a6d4190a0dd60fb94f1614a867f338e61f894200ae90ab86595dc00751cb555050a999aec1707db52c89e70e5abf32dcd707a382a7c0834e743c7fd3406e26cd7ede33d65110da4c69870cb9f933a3e919afe7b0c630a107303df6f25851249ef0539b11e03eacbaabc46d14171639090f7f4c096c8692bad2c8be51", @nested={0x1d4, 0x64, 0x0, 0x1, [@typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0xc, 0x7c, 0x0, 0x0, @u64=0x8001}, @typed={0xc, 0x35, 0x0, 0x0, @u64}, @generic="96b5683331591711af9339642d4f8bb929a93d1eedb2e204b3310dd80796ec8543b60fdc03ef1081140f1008e118c2aa29eb884c359a99b048b1ca3a4cf3d041685738d4ab705b4aa25059399ca8db9c24b1facfa0c08e3a15ee70b1d9c5af3139fc34698e95c2ed880f0686775ee0aff87c3de7c9596df73a1b4f1ba477f02775d9c9e09768ddb7ec72df384dc9c0f3281bad5d44a9d513daf3b455945f4c75a1184fb82c866b54c55482f4a291bdbad40df1", @typed={0x8, 0x7, 0x0, 0x0, @pid}, @generic="80e1f73ff8ee81a8a85f9ecf08c03f8330af9063c20d5730efc1561771f060031a94c7764e3e293d93c5447663b0d5b59ec1b376d8a16cfe50585731fc33e0981ee7429e41ae270c653374587851c6ea4749f9d9abfcad1cb5593c36c8beecdde7a37ad43ae96738abe61053b8757467cb48d4edf5eae755b9db76b52b3ceb8ac3025ec8535817ee93b4f237e2cc3bd2acb4dbc903963bad36ba59b2c228b0055147e0feaa8c514199dac0c2e0e2bf5f6ced24e6ac0f154e3c5815ff1d0d981349f3c9455bd828fc8ed8b4ed99f3092453df2ce8f16d0fd413", @typed={0x8, 0x55, 0x0, 0x0, @uid}, @typed={0x14, 0x20, 0x0, 0x0, @ipv6=@remote}]}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x800}, 0x8884) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:08:05 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) socket$nl_netfilter(0x10, 0x3, 0xc) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) accept(r0, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:08:05 executing program 7: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:08:05 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) read$eventfd(0xffffffffffffffff, &(0x7f0000000d40), 0x8) 23:08:17 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)) read$eventfd(0xffffffffffffffff, &(0x7f0000000d40), 0x8) 23:08:17 executing program 4: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:08:17 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) accept(r0, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:08:17 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000c80)=r1, 0x1) 23:08:17 executing program 7: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) 23:08:17 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) 23:08:17 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:08:17 executing program 0: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) 23:08:29 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000c80)=r1, 0x1) 23:08:29 executing program 0: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x8}, @mss={0x2, 0x800}, @window={0x3, 0x0, 0x9}, @timestamp], 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x71, 0x8000}, @sack_perm], 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x2ea5, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000180)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280), 0x4) 23:08:29 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) 23:08:29 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) accept(r0, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:08:29 executing program 4: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:08:29 executing program 1: read$eventfd(0xffffffffffffffff, &(0x7f0000000d40), 0x8) 23:08:29 executing program 7: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:08:29 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:08:29 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) 23:08:29 executing program 1: read$eventfd(0xffffffffffffffff, 0x0, 0x0) 23:08:29 executing program 0: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00'}) 23:08:29 executing program 4: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:08:29 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:08:29 executing program 7: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:08:29 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000c80), 0x1) 23:08:29 executing program 3: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) accept(r0, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:08:30 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:08:30 executing program 6: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)) openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) 23:08:30 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) r6 = accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80e}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x4010) 23:08:30 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:08:41 executing program 3: pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) accept(r0, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:08:41 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) r6 = accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80e}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x4010) 23:08:41 executing program 6: openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) 23:08:41 executing program 0: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) r6 = accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80e}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x4010) 23:08:41 executing program 7: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:08:41 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000c80), 0x1) 23:08:41 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:08:41 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x4, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24000090) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:08:41 executing program 6: openat$nvram(0xffffffffffffff9c, 0x0, 0x84000, 0x0) 23:08:41 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:08:41 executing program 3: pipe2(0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:08:41 executing program 6: openat$nvram(0xffffffffffffff9c, 0x0, 0x84000, 0x0) 23:08:41 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:08:42 executing program 2: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000c80), 0x1) 23:08:42 executing program 7: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget(0x2, 0x0, 0x80e) 23:08:42 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:08:42 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) r6 = accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(r6, &(0x7f0000000f40)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x80e}, 0xc, &(0x7f0000000f00)={&(0x7f0000000ec0)={0x40, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004000}, 0x4010) 23:08:42 executing program 3: pipe2(0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:08:54 executing program 6: openat$nvram(0xffffffffffffff9c, 0x0, 0x84000, 0x0) 23:08:54 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000e80)={'batadv_slave_1\x00'}) 23:08:54 executing program 5: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9001a008}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x20000804) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:08:54 executing program 3: pipe2(0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:08:54 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget$private(0x0, 0x1, 0x4) semget(0x2, 0x0, 0x80e) 23:08:54 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:08:54 executing program 7: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget$private(0x0, 0x1, 0x4) semget(0x2, 0x0, 0x80e) 23:08:54 executing program 2: io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000c80), 0x1) 23:08:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:08:54 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:08:54 executing program 2: io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, 0x0, 0x1) 23:08:54 executing program 6: openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) 23:08:54 executing program 3: pipe2(&(0x7f0000000f00), 0x0) accept(0xffffffffffffffff, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:08:54 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget$private(0x0, 0x1, 0x4) semget(0x2, 0x0, 0x80e) 23:08:54 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:08:54 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:09:08 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:08 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget$private(0x0, 0x1, 0x4) semget(0x2, 0x0, 0x80e) 23:09:08 executing program 6: openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) 23:09:08 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:08 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:09:08 executing program 3: pipe2(&(0x7f0000000f00), 0x0) accept(0xffffffffffffffff, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:09:08 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) accept(r0, &(0x7f0000000d80)=@vsock, &(0x7f0000000e00)=0x80) 23:09:08 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget$private(0x0, 0x1, 0x4) semget(0x2, 0x0, 0x80e) 23:09:08 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget$private(0x0, 0x1, 0x4) 23:09:08 executing program 6: openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) 23:09:08 executing program 3: pipe2(&(0x7f0000000f00), 0x0) accept(0xffffffffffffffff, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:09:08 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:09:08 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:08 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:08 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) 23:09:08 executing program 2: pipe2(&(0x7f0000000f00), 0x0) accept(0xffffffffffffffff, &(0x7f0000001140)=@can, &(0x7f00000011c0)=0x80) 23:09:08 executing program 3: pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) accept(r0, 0x0, &(0x7f00000011c0)) 23:09:08 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, 0x0, 0x40841) 23:09:21 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) 23:09:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, 0x0, 0x40841) 23:09:21 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) read$eventfd(r4, &(0x7f0000000d40), 0x8) 23:09:21 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:21 executing program 3: pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) accept(r0, 0x0, 0x0) 23:09:21 executing program 7: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:21 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_gettime(0x1, &(0x7f0000000400)) 23:09:21 executing program 6: pipe2(&(0x7f0000000f00)={0xffffffffffffffff}, 0x0) accept(r0, 0x0, &(0x7f00000011c0)) 23:09:21 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)) semget(0x2, 0x0, 0x80e) 23:09:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, 0x0, 0x40841) 23:09:21 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) clock_gettime(0x1, &(0x7f0000000400)) 23:09:21 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)) semget(0x2, 0x0, 0x80e) 23:09:21 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:21 executing program 7: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:33 executing program 3: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)) semget(0x2, 0x0, 0x80e) 23:09:33 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept(r4, &(0x7f0000000740)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000007c0)=0x80) socket$nl_netfilter(0x10, 0x3, 0xc) 23:09:33 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) perf_event_open(&(0x7f0000000cc0)={0x2, 0x80, 0x1, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:33 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:33 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) clock_gettime(0x1, &(0x7f0000000400)) 23:09:33 executing program 2: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept(r4, &(0x7f0000000740)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000007c0)=0x80) socket$nl_netfilter(0x10, 0x3, 0xc) 23:09:33 executing program 7: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000e40)={0x1c, 0x2, 0x2, 0x101, 0x0, 0x0, {0x0, 0x0, 0xa}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:09:33 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:33 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:33 executing program 2: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept(r4, &(0x7f0000000740)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000007c0)=0x80) socket$nl_netfilter(0x10, 0x3, 0xc) 23:09:33 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept(r4, &(0x7f0000000740)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000007c0)=0x80) socket$nl_netfilter(0x10, 0x3, 0xc) 23:09:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:09:33 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) clock_gettime(0x1, &(0x7f0000000400)) 23:09:33 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) io_uring_register$IORING_REGISTER_EVENTFD(r4, 0x4, &(0x7f0000000c80)=r2, 0x1) 23:09:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:09:33 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:33 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept(r4, &(0x7f0000000740)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000007c0)=0x80) socket$nl_netfilter(0x10, 0x3, 0xc) 23:09:47 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:47 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept(r4, &(0x7f0000000740)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000007c0)=0x80) socket$nl_netfilter(0x10, 0x3, 0xc) 23:09:47 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept(r4, &(0x7f0000000740)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000007c0)=0x80) socket$nl_netfilter(0x10, 0x3, 0xc) 23:09:47 executing program 2: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept(r4, &(0x7f0000000740)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000007c0)=0x80) socket$nl_netfilter(0x10, 0x3, 0xc) 23:09:47 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) clock_gettime(0x1, &(0x7f0000000400)) 23:09:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:09:47 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:47 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000c40)={{0x3f, 0x9}, {0x4c80000000000000}, 0x6, 0x1}) 23:09:47 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={0x0}, 0x1, 0x0, 0x0, 0x4040}, 0x40841) 23:09:47 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:47 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) clock_gettime(0x1, &(0x7f0000000400)) 23:09:48 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:09:48 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:09:48 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={0x0}}, 0x40841) 23:10:02 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:02 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) 23:10:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={0x0}}, 0x0) 23:10:02 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:02 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept(r4, &(0x7f0000000740)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000007c0)=0x80) socket$nl_netfilter(0x10, 0x3, 0xc) 23:10:02 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept(r4, &(0x7f0000000740)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000007c0)=0x80) socket$nl_netfilter(0x10, 0x3, 0xc) 23:10:02 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) clock_gettime(0x1, &(0x7f0000000400)) 23:10:02 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:10:02 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) clock_gettime(0x1, &(0x7f0000000400)) 23:10:02 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:10:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={0x0}}, 0x0) 23:10:02 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:02 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) [ 3343.664564] audit: type=1400 audit(1663542602.809:8): avc: denied { kernel } for pid=15652 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 23:10:17 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept(r4, &(0x7f0000000740)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000007c0)=0x80) 23:10:17 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:17 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) getpgrp(0xffffffffffffffff) clock_gettime(0x1, &(0x7f0000000400)) 23:10:17 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept(r4, &(0x7f0000000740)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000007c0)=0x80) socket$nl_netfilter(0x10, 0x3, 0xc) 23:10:17 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:10:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={0x0}}, 0x0) 23:10:17 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:17 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) 23:10:17 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:17 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:17 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) 23:10:17 executing program 5: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000b00), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x54, r5, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xa6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x90}, 0x24000804) 23:10:17 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) clock_gettime(0x1, &(0x7f0000000400)) 23:10:17 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:17 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:17 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept(r4, &(0x7f0000000740)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f00000007c0)=0x80) 23:10:17 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) clock_gettime(0x1, &(0x7f0000000400)) 23:10:17 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:17 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 23:10:17 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000a80)) 23:10:17 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:17 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)) 23:10:17 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:17 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:30 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="0872bb245baafa863f4e04cce2d1e5713c472024407cea86256b3c5d1390db3c667668858b7bfffb519dbb29b5f12eafc868b1da9201f32421f667d6cec130d319bf355dd56cf3f7332122ae7134cf5590b3c939b9582e948b930d696fc972086ad0f1471f92b8e1e4af4a8e916677468e6ed9265f1799ac734ae978e40706d6536ad76f082a114a02dac9283c352303d9cd0c0aa3ba7308e4d2710ba0c8a00077f572e22f90c558133521b8f834d8b1a65fe86d4b4782140a7f6d1df6fdb0dc38d7968850d0ccf2e4fce098f5dbc6ef1d42ccc8c4e8ec94fd7db7fb037b599865d3de3cfbf5a09f957324d7d9933eba6f0fc4fc78d8220955f7d2", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="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"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) openat$nvram(0xffffffffffffff9c, &(0x7f0000000a40), 0x84000, 0x0) 23:10:30 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:30 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:30 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) 23:10:30 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r0, &(0x7f00000000c0)) clock_gettime(0x1, &(0x7f0000000400)) 23:10:30 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) clock_gettime(0x0, &(0x7f0000000480)) 23:10:30 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:30 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 23:10:30 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:30 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x0, &(0x7f0000000480)) 23:10:30 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:30 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) clock_gettime(0x1, &(0x7f0000000400)) 23:10:30 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:30 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_gettime(0x0, &(0x7f0000000480)) 23:10:30 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:30 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:30 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000940)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000900)={&(0x7f0000000600)={0x2fc, 0xa, 0x3, 0x401, 0x70bd25, 0x25dfdbfc, {0xd, 0x0, 0x8}, [@typed={0x8, 0x7e, 0x0, 0x0, @pid=r3}, @generic="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", @generic="1847e2b23fb7480988e2b1b8a37fc292c0a6714bc9568664d0f319239fa1e10e08a2be33a3bdda37819144a56028ebea217c55bead604a1e897a900a6930517bd1b2038295b5d0626661eec20a36bb7dacf4996442421433663dad1e96337ae71eb0f7876772fad27ee26fc84f0095f0afc6b8082ac792fef9fad22caff9c739af0faff62e666721ee792862a73a1e326a97fbbae8988d6e5b60340bb59cf550cee91f169888af11d27ad3182b887fb498a778c26532f03f804f66cc0580ed49664033fd9c91e3fa0807470d9a88bf3664", @nested={0x109, 0x48, 0x0, 0x1, [@typed={0x8, 0x63, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="0a22d7382cee4eaebb41b250e5583559aaa82fae14dbe3beeed3a9c77f2461ffb171729b2d6f1d4707a80e847eef8de42bd955167a8301869c30742fb20ea6cb46c36536f1ae6cd3ab260120aa49f74fbe7d56e7776fd21009260bb74890c60bdf003365bec02f55733927146378b56655889dec0eb9a58bb2eb78055f595bf718aba8eee458a44eac256290702c163c208db54292f94b988e5664ebf5e8787861d1c1685a460f6f8f3975fb4f0684563118be0581658e8157b926d0c4a55e9ce85052e1dea65d0de1829b52f2bc0278690984c4a92164feb05a97e7658ff5ae0d23fca87ca77c5231857f90c60db86ee3ad330ae91af96bdcb6d680a0"]}, @typed={0x8, 0x41, 0x0, 0x0, @u32=0x2}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x20044000}, 0x4) 23:10:30 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:30 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) clock_gettime(0x0, &(0x7f0000000480)) 23:10:41 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:41 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) 23:10:41 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000700)) 23:10:41 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) clock_gettime(0x1, &(0x7f0000000400)) 23:10:41 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x8, 0x101, 0x0, 0x0, {0x8, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0x20048000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)) 23:10:41 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:41 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) clock_gettime(0x0, &(0x7f0000000480)) 23:10:41 executing program 5: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:41 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) clock_gettime(0x0, &(0x7f0000000480)) 23:10:41 executing program 0: clock_gettime(0x1, &(0x7f0000000400)) 23:10:41 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000400)={'syztnl2\x00', &(0x7f0000000380)={'sit0\x00', 0x0, 0x29, 0x8, 0x3f, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @rand_addr=' \x01\x00', 0x8000, 0x1, 0x2, 0x7}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000580)) 23:10:41 executing program 5: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:53 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:53 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000580)) 23:10:53 executing program 0: clock_gettime(0x0, &(0x7f0000000400)) 23:10:53 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/module/devres', 0x103140, 0x1) 23:10:53 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:53 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) clock_gettime(0x0, &(0x7f0000000480)) 23:10:53 executing program 5: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:10:53 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 23:10:53 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:05 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:05 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) clock_gettime(0x0, &(0x7f0000000480)) 23:11:05 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x40, 0x6, 0x9, 0x301, 0x70bd2c, 0x25dfdbfe, {0x2}, [@nested={0x2a, 0x6f, 0x0, 0x1, [@generic="9e115141e986831314aea3e3032f317ab626f8a6fe5b7f98d062ec14ad23108ffcf3868a25af"]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 23:11:05 executing program 0: clock_gettime(0x0, &(0x7f0000000400)) 23:11:05 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:05 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:05 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000580)) 23:11:05 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:11:05 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:05 executing program 0: clock_gettime(0x0, &(0x7f0000000400)) 23:11:05 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:05 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:05 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) clock_gettime(0x0, &(0x7f0000000480)) 23:11:05 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) 23:11:16 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:16 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000580)) 23:11:16 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:16 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000480)) 23:11:16 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:16 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) 23:11:16 executing program 0: clock_gettime(0x1, 0x0) 23:11:16 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:11:16 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:16 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) getpgrp(0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000480)) 23:11:16 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000580)=0x4, 0x4) 23:11:16 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:17 executing program 0: clock_gettime(0x1, 0x0) 23:11:17 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) 23:11:17 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:17 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000540)) 23:11:17 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:17 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000580)) 23:11:17 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) clock_gettime(0x0, &(0x7f0000000480)) 23:11:17 executing program 0: clock_gettime(0x1, 0x0) 23:11:17 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:17 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:31 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000580)) 23:11:31 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) 23:11:31 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:31 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:31 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) clock_gettime(0x0, &(0x7f0000000480)) 23:11:31 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) openat$nvram(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) 23:11:31 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:31 executing program 0: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e21, 0x39, @remote, 0x1}}, 0x0, 0x0, 0x7, 0x0, "7057f246fb103af293b92e9bdd03ae3ccb582f9151ccbee6dcca6bd8f453efaffa4c75e3fe7543569a620826f893e3519c152c36bc4df65b9cb5f605a7be7ff4eb8ed791a1195837f8c5930e7a95b8cc"}, 0xd8) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000580)) 23:11:31 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:31 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:31 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) 23:11:32 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000480)) 23:11:32 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:32 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) socket$inet6_udplite(0xa, 0x2, 0x88) 23:11:32 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:32 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) 23:11:44 executing program 0: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:44 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000480)) 23:11:44 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r2, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) 23:11:44 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x4, 0x6, 0x301, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20008084) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000580)) 23:11:44 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:44 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:44 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:44 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) 23:11:58 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:58 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) 23:11:58 executing program 1: socketpair(0x28, 0x80808, 0x0, &(0x7f0000000000)) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000580)) 23:11:58 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:58 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r0, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r1, &(0x7f0000000300)=@generic, &(0x7f0000000380)=0x80) 23:11:58 executing program 0: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:58 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x401, 0x0, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:58 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) clock_gettime(0x0, &(0x7f0000000480)) 23:11:58 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:58 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:58 executing program 0: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:58 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:58 executing program 2: clock_gettime(0x0, &(0x7f0000000480)) 23:11:58 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) 23:11:58 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:58 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:58 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r0, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) socket$inet6_icmp(0xa, 0x2, 0x3a) 23:11:58 executing program 0: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:11:58 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:10 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r0, &(0x7f0000000240)=@xdp, &(0x7f00000002c0)=0x80) 23:12:10 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:10 executing program 2: clock_gettime(0x0, 0x0) 23:12:10 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) 23:12:10 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:10 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x20000, 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000580)) 23:12:10 executing program 0: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:10 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:10 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:11 executing program 0: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:11 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) 23:12:11 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x20000, 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000580)) 23:12:11 executing program 6: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) 23:12:11 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x401}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:11 executing program 2: clock_gettime(0x0, 0x0) 23:12:11 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:11 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:11 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) 23:12:11 executing program 4: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:12:11 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:11 executing program 0: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:25 executing program 0: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:25 executing program 6: eventfd2(0x5, 0x80801) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) 23:12:25 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) clock_gettime(0x0, &(0x7f0000000480)) 23:12:25 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:25 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x20000, 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000580)) 23:12:25 executing program 2: clock_gettime(0x0, 0x0) 23:12:25 executing program 3: eventfd2(0x5, 0x80801) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000000)=0x7, 0x4) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) 23:12:25 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:25 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x20000, 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000580)) 23:12:25 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:25 executing program 0: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:25 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:12:36 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x0, 0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000580)) 23:12:36 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:12:36 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:12:36 executing program 3: eventfd2(0x5, 0x80801) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) 23:12:36 executing program 6: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'batadv0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0xd7cca82dcdb0929f}, 0x24044040) 23:12:36 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:36 executing program 0: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:36 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:36 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:12:36 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:36 executing program 6: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, 0x0, 0x24044040) 23:12:36 executing program 0: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:36 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000580)) 23:12:36 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:12:36 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80810, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:47 executing program 6: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, 0x0, 0x0) 23:12:47 executing program 0: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:47 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:12:47 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000580)) 23:12:47 executing program 3: getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) 23:12:47 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:47 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:12:47 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:48 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000580)) 23:12:48 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x401, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:48 executing program 0: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:48 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:48 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) 23:12:48 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:48 executing program 3: getsockname(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 23:12:48 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000580)) 23:12:48 executing program 6: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:48 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:12:48 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:48 executing program 0: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:48 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:48 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) 23:12:59 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:59 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:12:59 executing program 6: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:59 executing program 0: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:59 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:59 executing program 3: getsockname(0xffffffffffffffff, 0x0, 0x0) 23:12:59 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/profiling', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000580)) 23:12:59 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)) 23:12:59 executing program 0: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:59 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:12:59 executing program 7: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:12:59 executing program 6: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:59 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:12:59 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:13:11 executing program 6: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:13:11 executing program 7: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:13:11 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:13:11 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget$private(0x0, 0x1, 0x4) 23:13:11 executing program 3: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:13:11 executing program 0: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:13:11 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) 23:13:11 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:13:11 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:13:11 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) 23:13:11 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) 23:13:11 executing program 0: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:13:11 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:13:11 executing program 7: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:13:11 executing program 3: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:13:11 executing program 6: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:13:11 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)) 23:13:24 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget$private(0x0, 0x1, 0x4) 23:13:24 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:13:24 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:13:24 executing program 3: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:13:24 executing program 0: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:13:24 executing program 6: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:13:24 executing program 7: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) 23:13:24 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) clock_getres(0x1, &(0x7f00000003c0)) 23:13:24 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:13:24 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) semget(0x2, 0x0, 0x80e) [ 3545.750604] ------------[ cut here ]------------ [ 3545.750654] [ 3545.750660] ====================================================== [ 3545.750667] WARNING: possible circular locking dependency detected [ 3545.750675] 6.0.0-rc5-next-20220916 #1 Not tainted [ 3545.750690] ------------------------------------------------------ [ 3545.750696] syz-executor.0/16308 is trying to acquire lock: [ 3545.750711] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 3545.750783] [ 3545.750783] but task is already holding lock: [ 3545.750788] ffff88800feb6020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 3545.750847] [ 3545.750847] which lock already depends on the new lock. [ 3545.750847] [ 3545.750853] [ 3545.750853] the existing dependency chain (in reverse order) is: [ 3545.750860] [ 3545.750860] -> #3 (&ctx->lock){....}-{2:2}: [ 3545.750890] _raw_spin_lock+0x2a/0x40 [ 3545.750927] __perf_event_task_sched_out+0x53b/0x18d0 [ 3545.750954] __schedule+0xedd/0x2470 [ 3545.750977] preempt_schedule_common+0x45/0xc0 [ 3545.751002] __cond_resched+0x17/0x30 [ 3545.751025] __mutex_lock+0xa3/0x14d0 [ 3545.751051] __do_sys_perf_event_open+0x1eec/0x32c0 [ 3545.751079] do_syscall_64+0x3b/0x90 [ 3545.751110] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3545.751149] [ 3545.751149] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 3545.751179] _raw_spin_lock_nested+0x30/0x40 [ 3545.751214] raw_spin_rq_lock_nested+0x1e/0x30 [ 3545.751241] task_fork_fair+0x63/0x4d0 [ 3545.751284] sched_cgroup_fork+0x3d0/0x540 [ 3545.751318] copy_process+0x4183/0x6e20 [ 3545.751341] kernel_clone+0xe7/0x890 [ 3545.751362] user_mode_thread+0xad/0xf0 [ 3545.751384] rest_init+0x24/0x250 [ 3545.751422] arch_call_rest_init+0xf/0x14 [ 3545.751446] start_kernel+0x4c1/0x4e6 [ 3545.751468] secondary_startup_64_no_verify+0xe0/0xeb [ 3545.751498] [ 3545.751498] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 3545.751528] _raw_spin_lock_irqsave+0x39/0x60 [ 3545.751563] try_to_wake_up+0xab/0x1920 [ 3545.751592] up+0x75/0xb0 [ 3545.751617] __up_console_sem+0x6e/0x80 [ 3545.751652] console_unlock+0x46a/0x590 [ 3545.751688] vprintk_emit+0x1bd/0x560 [ 3545.751725] vprintk+0x84/0xa0 [ 3545.751761] _printk+0xba/0xf1 [ 3545.751801] kauditd_hold_skb.cold+0x3f/0x4e [ 3545.751833] kauditd_send_queue+0x233/0x290 [ 3545.751864] kauditd_thread+0x5da/0x9a0 [ 3545.751895] kthread+0x2ed/0x3a0 [ 3545.751926] ret_from_fork+0x22/0x30 [ 3545.751953] [ 3545.751953] -> #0 ((console_sem).lock){....}-{2:2}: [ 3545.751984] __lock_acquire+0x2a02/0x5e70 [ 3545.752020] lock_acquire+0x1a2/0x530 [ 3545.752056] _raw_spin_lock_irqsave+0x39/0x60 [ 3545.752091] down_trylock+0xe/0x70 [ 3545.752118] __down_trylock_console_sem+0x3b/0xd0 [ 3545.752155] vprintk_emit+0x16b/0x560 [ 3545.752191] vprintk+0x84/0xa0 [ 3545.752228] _printk+0xba/0xf1 [ 3545.752266] report_bug.cold+0x72/0xab [ 3545.752294] handle_bug+0x3c/0x70 [ 3545.752324] exc_invalid_op+0x14/0x50 [ 3545.752355] asm_exc_invalid_op+0x16/0x20 [ 3545.752393] group_sched_out.part.0+0x2c7/0x460 [ 3545.752415] ctx_sched_out+0x8f1/0xc10 [ 3545.752437] __perf_event_task_sched_out+0x6d0/0x18d0 [ 3545.752464] __schedule+0xedd/0x2470 [ 3545.752486] preempt_schedule_common+0x45/0xc0 [ 3545.752512] __cond_resched+0x17/0x30 [ 3545.752535] __mutex_lock+0xa3/0x14d0 [ 3545.752560] __do_sys_perf_event_open+0x1eec/0x32c0 [ 3545.752589] do_syscall_64+0x3b/0x90 [ 3545.752619] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3545.752658] [ 3545.752658] other info that might help us debug this: [ 3545.752658] [ 3545.752664] Chain exists of: [ 3545.752664] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 3545.752664] [ 3545.752696] Possible unsafe locking scenario: [ 3545.752696] [ 3545.752701] CPU0 CPU1 [ 3545.752706] ---- ---- [ 3545.752710] lock(&ctx->lock); [ 3545.752722] lock(&rq->__lock); [ 3545.752736] lock(&ctx->lock); [ 3545.752750] lock((console_sem).lock); [ 3545.752763] [ 3545.752763] *** DEADLOCK *** [ 3545.752763] [ 3545.752767] 2 locks held by syz-executor.0/16308: [ 3545.752782] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 3545.752839] #1: ffff88800feb6020 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 3545.752900] [ 3545.752900] stack backtrace: [ 3545.752906] CPU: 0 PID: 16308 Comm: syz-executor.0 Not tainted 6.0.0-rc5-next-20220916 #1 [ 3545.752933] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 3545.752950] Call Trace: [ 3545.752956] [ 3545.752965] dump_stack_lvl+0x8b/0xb3 [ 3545.752999] check_noncircular+0x263/0x2e0 [ 3545.753036] ? format_decode+0x26c/0xb50 [ 3545.753069] ? print_circular_bug+0x450/0x450 [ 3545.753108] ? enable_ptr_key_workfn+0x20/0x20 [ 3545.753141] ? mark_lock.part.0+0xef/0x2f70 [ 3545.753179] ? format_decode+0x26c/0xb50 [ 3545.753215] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 3545.753255] __lock_acquire+0x2a02/0x5e70 [ 3545.753304] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 3545.753356] lock_acquire+0x1a2/0x530 [ 3545.753397] ? down_trylock+0xe/0x70 [ 3545.753430] ? rcu_read_unlock+0x40/0x40 [ 3545.753477] ? vprintk+0x84/0xa0 [ 3545.753518] _raw_spin_lock_irqsave+0x39/0x60 [ 3545.753554] ? down_trylock+0xe/0x70 [ 3545.753585] down_trylock+0xe/0x70 [ 3545.753614] ? vprintk+0x84/0xa0 [ 3545.753653] __down_trylock_console_sem+0x3b/0xd0 [ 3545.753692] vprintk_emit+0x16b/0x560 [ 3545.753736] vprintk+0x84/0xa0 [ 3545.753776] _printk+0xba/0xf1 [ 3545.753818] ? record_print_text.cold+0x16/0x16 [ 3545.753880] ? perf_event_update_userpage+0x4e8/0x7c0 [ 3545.753913] ? report_bug.cold+0x66/0xab [ 3545.753946] ? group_sched_out.part.0+0x2c7/0x460 [ 3545.753972] report_bug.cold+0x72/0xab [ 3545.754011] handle_bug+0x3c/0x70 [ 3545.754043] exc_invalid_op+0x14/0x50 [ 3545.754077] asm_exc_invalid_op+0x16/0x20 [ 3545.754117] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 3545.754146] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 3545.754170] RSP: 0018:ffff88800953f978 EFLAGS: 00010006 [ 3545.754190] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 3545.754207] RDX: ffff888038b0d040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 3545.754224] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 3545.754240] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800feb6000 [ 3545.754256] R13: ffff88806ce3ef00 R14: ffffffff85238040 R15: 0000000000000002 [ 3545.754281] ? group_sched_out.part.0+0x2c7/0x460 [ 3545.754336] ? group_sched_out.part.0+0x2c7/0x460 [ 3545.754365] ctx_sched_out+0x8f1/0xc10 [ 3545.754393] __perf_event_task_sched_out+0x6d0/0x18d0 [ 3545.754427] ? lock_is_held_type+0xd7/0x130 [ 3545.754470] ? __perf_cgroup_move+0x160/0x160 [ 3545.754496] ? set_next_entity+0x304/0x550 [ 3545.754536] ? update_curr+0x267/0x740 [ 3545.754578] ? lock_is_held_type+0xd7/0x130 [ 3545.754621] __schedule+0xedd/0x2470 [ 3545.754652] ? io_schedule_timeout+0x150/0x150 [ 3545.754677] ? find_held_lock+0x2c/0x110 [ 3545.754714] ? lock_is_held_type+0xd7/0x130 [ 3545.754755] ? __cond_resched+0x17/0x30 [ 3545.754782] preempt_schedule_common+0x45/0xc0 [ 3545.754811] __cond_resched+0x17/0x30 [ 3545.754836] __mutex_lock+0xa3/0x14d0 [ 3545.754866] ? lock_is_held_type+0xd7/0x130 [ 3545.754906] ? __do_sys_perf_event_open+0x1eec/0x32c0 [ 3545.754939] ? mutex_lock_io_nested+0x1310/0x1310 [ 3545.754968] ? lock_release+0x3b2/0x750 [ 3545.755008] ? __up_read+0x192/0x730 [ 3545.755041] ? up_write+0x480/0x480 [ 3545.755073] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 3545.755116] __do_sys_perf_event_open+0x1eec/0x32c0 [ 3545.755152] ? __up_read+0x192/0x730 [ 3545.755184] ? perf_compat_ioctl+0x130/0x130 [ 3545.755212] ? up_write+0x480/0x480 [ 3545.755253] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3545.755296] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3545.755343] do_syscall_64+0x3b/0x90 [ 3545.755375] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3545.755416] RIP: 0033:0x7f2e8e148b19 [ 3545.755436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3545.755460] RSP: 002b:00007f2e8b6be188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 3545.755484] RAX: ffffffffffffffda RBX: 00007f2e8e25bf60 RCX: 00007f2e8e148b19 [ 3545.755501] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000cc0 [ 3545.755517] RBP: 00007f2e8e1a2f6d R08: 0000000000000000 R09: 0000000000000000 [ 3545.755533] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 3545.755549] R13: 00007ffe59c7b51f R14: 00007f2e8b6be300 R15: 0000000000022000 [ 3545.755577] [ 3545.874858] WARNING: CPU: 0 PID: 16308 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 3545.876186] Modules linked in: [ 3545.876649] CPU: 0 PID: 16308 Comm: syz-executor.0 Not tainted 6.0.0-rc5-next-20220916 #1 [ 3545.877804] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 3545.879409] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 3545.880199] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 3545.882781] RSP: 0018:ffff88800953f978 EFLAGS: 00010006 [ 3545.883542] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 3545.884565] RDX: ffff888038b0d040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 3545.885580] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 3545.886596] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800feb6000 [ 3545.887604] R13: ffff88806ce3ef00 R14: ffffffff85238040 R15: 0000000000000002 [ 3545.888617] FS: 00007f2e8b6be700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 3545.889750] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3545.890596] CR2: 00007fcf9124d3a4 CR3: 0000000015e2c000 CR4: 0000000000350ef0 [ 3545.891603] Call Trace: [ 3545.891987] [ 3545.892324] ctx_sched_out+0x8f1/0xc10 [ 3545.892899] __perf_event_task_sched_out+0x6d0/0x18d0 [ 3545.893657] ? lock_is_held_type+0xd7/0x130 [ 3545.894321] ? __perf_cgroup_move+0x160/0x160 [ 3545.894948] ? set_next_entity+0x304/0x550 [ 3545.895546] ? update_curr+0x267/0x740 [ 3545.896100] ? lock_is_held_type+0xd7/0x130 [ 3545.896715] __schedule+0xedd/0x2470 [ 3545.897242] ? io_schedule_timeout+0x150/0x150 [ 3545.897882] ? find_held_lock+0x2c/0x110 [ 3545.898475] ? lock_is_held_type+0xd7/0x130 [ 3545.899088] ? __cond_resched+0x17/0x30 [ 3545.899641] preempt_schedule_common+0x45/0xc0 [ 3545.900282] __cond_resched+0x17/0x30 [ 3545.900819] __mutex_lock+0xa3/0x14d0 [ 3545.901362] ? lock_is_held_type+0xd7/0x130 [ 3545.901967] ? __do_sys_perf_event_open+0x1eec/0x32c0 [ 3545.902700] ? mutex_lock_io_nested+0x1310/0x1310 [ 3545.903366] ? lock_release+0x3b2/0x750 [ 3545.903953] ? __up_read+0x192/0x730 [ 3545.904506] ? up_write+0x480/0x480 [ 3545.905045] ? _raw_spin_unlock_irqrestore+0x28/0x60 [ 3545.905796] __do_sys_perf_event_open+0x1eec/0x32c0 [ 3545.906534] ? __up_read+0x192/0x730 [ 3545.907083] ? perf_compat_ioctl+0x130/0x130 [ 3545.907721] ? up_write+0x480/0x480 [ 3545.908276] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3545.909032] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3545.909792] do_syscall_64+0x3b/0x90 [ 3545.910374] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 3545.911129] RIP: 0033:0x7f2e8e148b19 [ 3545.911676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3545.914220] RSP: 002b:00007f2e8b6be188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 3545.915297] RAX: ffffffffffffffda RBX: 00007f2e8e25bf60 RCX: 00007f2e8e148b19 [ 3545.916306] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000cc0 [ 3545.917312] RBP: 00007f2e8e1a2f6d R08: 0000000000000000 R09: 0000000000000000 [ 3545.918326] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 3545.919350] R13: 00007ffe59c7b51f R14: 00007f2e8b6be300 R15: 0000000000022000 [ 3545.920365] [ 3545.920702] irq event stamp: 148 [ 3545.921185] hardirqs last enabled at (147): [] _raw_spin_unlock_irqrestore+0x28/0x60 [ 3545.922542] hardirqs last disabled at (148): [] __schedule+0x1225/0x2470 [ 3545.923712] softirqs last enabled at (144): [] __irq_exit_rcu+0x11b/0x180 [ 3545.924915] softirqs last disabled at (135): [] __irq_exit_rcu+0x11b/0x180 [ 3545.926147] ---[ end trace 0000000000000000 ]--- 23:13:24 executing program 3: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:13:25 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:13:25 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) 23:13:25 executing program 6: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:13:25 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:13:25 executing program 7: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) 23:13:34 executing program 7: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)) 23:13:34 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) clock_getres(0x1, &(0x7f00000003c0)) 23:13:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:13:34 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)) 23:13:34 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) 23:13:34 executing program 5: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:13:34 executing program 6: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) 23:13:34 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x500, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x7, &(0x7f0000000380)=r3, 0x1) eventfd2(0x88c6, 0x800) clock_getres(0x1, &(0x7f00000003c0)) clock_gettime(0x1, &(0x7f0000000400)) r5 = semget$private(0x0, 0x1, 0x4) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) semtimedop(r5, &(0x7f0000000440)=[{0x2, 0xf87, 0x1000}, {0x3, 0xef, 0x1000}, {0x3, 0x7fff, 0x800}, {0x3, 0x7, 0x2400}, {0x2, 0xffff, 0x1000}, {0x4, 0x8000, 0x1800}, {0x3, 0x9, 0x3000}, {0x4, 0x9, 0x1000}, {0x4, 0x7, 0x1800}], 0x9, &(0x7f00000004c0)={r6, r7+10000000}) 23:13:34 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8001, &(0x7f0000000000)=""/59) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) sched_rr_get_interval(r1, &(0x7f00000000c0)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, 0xffffffffffffffff, 0xfffffff8}) io_uring_setup(0x1f0d, &(0x7f0000000140)={0x0, 0x84a0, 0x4, 0x3, 0x57}) r2 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r2, &(0x7f00000001c0)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x200300, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/class/udc', 0x200, 0x1a) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6a, 0x3, 0x7}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x8000, &(0x7f0000000300)=""/61) clock_getres(0x1, &(0x7f00000003c0)) 23:13:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:13:34 executing program 6: perf_event_open(&(0x7f0000000cc0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x0) VM DIAGNOSIS: 23:13:25 Registers: info registers vcpu 0 RAX=0000000000000030 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b3251 RDI=ffffffff87641ba0 RBP=ffffffff87641b60 RSP=ffff88800953f3c8 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000030 R11=0000000000000001 R12=0000000000000030 R13=ffffffff87641b60 R14=0000000000000010 R15=ffffffff822b3240 RIP=ffffffff822b32a9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f2e8b6be700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fcf9124d3a4 CR3=0000000015e2c000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007ff1ad3667c0 00007ff1ad3667c8 YMM02=0000000000000000 0000000000000000 00007ff1ad3667e0 00007ff1ad3667c0 YMM03=0000000000000000 0000000000000000 00007ff1ad3667c8 00007ff1ad3667c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=ffffed100d9e13d4 RBX=000000000000000f RCX=000000000000000f RDX=0000000000000046 RSI=0000033985ddd6b7 RDI=ffff88806cf2a640 RBP=dffffc0000000000 RSP=ffff88806cf09e28 R8 =0000000000000006 R9 =7fffffffffffffff R10=0000033985ddd6b7 R11=0000000000000001 R12=0000000000000046 R13=ffff88806cf2a640 R14=0000000000000000 R15=ffff88806cf2a640 RIP=ffffffff8136e4a9 RFL=00000086 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f330a5628c0 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fcc19b663a4 CR3=000000000eba6000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 00000000000000ff 0000000000ff0000 YMM03=0000000000000000 0000000000000000 0000555b7beeb290 0000000600000008 YMM04=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM05=0000000000000000 0000000000000000 0000000500000007 0000555b7beed620 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000800000005 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 732f636f72702f00 6b63616d7300632e YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000