40)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x15a, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:46 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb8000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:46 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000050000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:26:46 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x11]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2707.751044][T16983] Cannot find del_set index 0 as target [ 2707.826446][T16987] Cannot find del_set index 0 as target 20:26:46 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x188, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:47 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb8010000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:47 executing program 3: eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a3100004c05286ce2a9a6f09c484e3b05479ce8000000"], 0x230}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 20:26:47 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x1d]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:47 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000060000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:26:47 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1b8, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2708.286915][T17013] Cannot find del_set index 0 as target [ 2708.341636][T17022] __nla_validate_parse: 29 callbacks suppressed [ 2708.341658][T17022] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2708.342034][T17019] Cannot find del_set index 0 as target [ 2708.487872][T17039] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:26:47 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x88]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:47 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xec231a00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2708.604963][T17029] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2708.736077][T17049] Cannot find del_set index 0 as target 20:26:47 executing program 3: eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000600)={0x120, 0x2, 0x2, 0x101, 0x0, 0x0, {0x5, 0x0, 0x1}, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}, @CTA_EXPECT_FLAGS={0x8}, @CTA_EXPECT_MASTER={0x40, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x0, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x131}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @CTA_EXPECT_TUPLE={0x54, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0xffffffffffffff06, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_TUPLE={0x68, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @local}}}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x40}, 0xc48bf33a38d7016e) write$binfmt_elf64(r0, &(0x7f0000000840)={{0x7f, 0x45, 0x4c, 0x46, 0x57, 0x4, 0x80, 0x7f, 0x80000001, 0x3, 0xd9b39114f19463a5, 0x0, 0x67, 0x40, 0x35a, 0x81, 0xffff, 0x38, 0x1, 0x7f, 0x4}, [{0x60000000, 0x9, 0x23ba, 0x2, 0x9, 0x3, 0x6, 0x3}, {0x0, 0x10001, 0x3292, 0x1ff, 0x7, 0x8, 0x4, 0x4}], "26b71e491e5a66d73241d01e932b2ddfac171adafb2cf38dc41965c51aef2b79ec3b6f17a50aa5090bc99ca349c45261ac201470e9876557d7b9c557525abc929b0be495f1506039fd8903b5a1b7cd0c379e1a1ced22b3adadaca989e77e6bbfa273d59a6ffad9825c440b7216901f943a25029f7113ab499b2d14847a76d5ee57935e61e8b36b73195ecf0da71233d180dc21", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x943) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000140), 0x29, 0x800) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0x1b) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0xfffffeff, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}, 0x1, 0x0, 0x0, 0x801}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 20:26:47 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x25c, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:47 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000070000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:26:48 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x300]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:48 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2709.174732][T17077] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2709.235667][T17079] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:26:48 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x26e, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2709.276942][T17082] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. 20:26:48 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x500]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2709.523425][T17077] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 20:26:48 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:48 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000080000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2709.592635][T17082] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. 20:26:48 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x300, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:48 executing program 3: r0 = eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc"], 0x230}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'ip6_vti0\x00'}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc"], 0x230}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYRESOCT=r4, @ANYRES32=r0], 0x230}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r4, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f00000006c0)={0xc0, 0x0, 0x2, 0x201, 0x0, 0x0, {0xc, 0x0, 0x6}, [@CTA_EXPECT_FLAGS={0x8}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_MASTER={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @CTA_EXPECT_MASTER={0x6c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4}, 0x20000800) dup3(r1, r3, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x230}}, 0x0) r6 = syz_open_dev$mouse(&(0x7f0000000080), 0x7, 0x2) sendmsg$NFT_BATCH(r6, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_DELTABLE={0x30, 0x2, 0xa, 0x5, 0x0, 0x0, {0xa, 0x0, 0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x20}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x30}, @NFTA_SET_DATA_TYPE={0x8}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x4}]}], {0x14}}, 0x9c}, 0x1, 0x0, 0x0, 0x8000}, 0x8d1) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) [ 2709.956256][T17127] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:26:49 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x1100]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:49 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:49 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000090000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2710.250359][T17141] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. 20:26:49 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x30c, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:49 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x1d00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:49 executing program 3: eventfd2(0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x660}, 0x1, 0x0, 0x0, 0x24040091}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc"], 0x230}}, 0x0) dup3(r1, r2, 0x80000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a030000000000000000000000000009000073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc00"], 0x230}}, 0x0) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="ec0000000206010400000000000000000cb541f7ba000400020000003c000780180002801400024000000000000000000000000000000001080006400000000108001340ffff7fc10800134000000002060004404e22000005000100070000000500040000000000100003006f7274000500010007000014050004000200000064000780d608000640000000090800094000000004050014008100000008000a40000000020800124000005d1708000640000008001800018014000240fc0100000000000000000000000000000800174000000400080006400000000405000300"/236], 0xec}, 0x1, 0x0, 0x0, 0x2000c000}, 0x4844) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 20:26:49 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x2}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2710.720242][T17175] set_target_v0_checkentry: 8 callbacks suppressed [ 2710.720286][T17175] Cannot find del_set index 0 as target 20:26:49 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a0104000000000b0000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:26:49 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x700, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:50 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x1f00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2710.997991][T17188] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 2711.042586][T17192] Cannot find del_set index 0 as target 20:26:50 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x3}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2711.134953][T17207] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 2711.286929][T17211] Cannot find del_set index 0 as target 20:26:50 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a0104000000000c0000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:26:50 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0xc03, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:50 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x2000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:50 executing program 3: eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cachefiles(0xffffff9c, &(0x7f0000000040), 0x218503, 0x0) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0xc4, 0x1, 0x3, 0x5, 0x0, 0x0, {0x7, 0x0, 0x5}, [@NFQA_VLAN={0xc, 0x13, 0x0, 0x1, [@NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0xf7}]}, @NFQA_MARK={0x8}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffb, 0x10000}}, @NFQA_PAYLOAD={0x8e, 0xa, "2ca0679f99c3f82d8a79aa5d5b10fba03bf4fb0b18e4f5e503ef3c811e32982f30c9b7c0c85496e97cd05ef37a87e22a541f2d6ffda94000bebf8f75e31881e6ea125d513ee34418bd120fb92517e40884aa43d97a4627608ae7c2121cd3c845f8fc3ad4ed5922854ffda2b61eba9164248c8cacd78f5c5e5cc430e6b89a46473fb4aa78faeb02118b22"}]}, 0xc4}, 0x1, 0x0, 0x0, 0x86f9c300327f5ae6}, 0x40000) 20:26:50 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x4}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2711.538187][T17223] Cannot find del_set index 0 as target [ 2711.801984][T17240] Cannot find del_set index 0 as target 20:26:50 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1100, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:51 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x8800]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:51 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a0104000000000e0000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2712.027125][T17257] Cannot find del_set index 0 as target 20:26:51 executing program 3: eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) mknod(0x0, 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket(0x26, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r0, r2) keyctl$get_persistent(0x16, r0, 0x0) open(0x0, 0x420002, 0x0) dup(0xffffffffffffffff) io_setup(0x6, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x84200, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000080)=ANY=[]) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp, 0x121, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}, 0x10) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) [ 2712.146720][T17264] Cannot find del_set index 0 as target 20:26:51 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x7}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2712.225412][T17265] Cannot find del_set index 0 as target 20:26:51 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1500, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:51 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x1a23ec]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:51 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a0104000000000f0000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:26:51 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x8}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:51 executing program 3: eventfd2(0x0, 0x0) syncfs(0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x9, 0x1f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x3, 0x2, 0x80, 0x0, 0x2, 0x94012, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xd7, 0x1, @perf_config_ext={0xffffffff, 0x3f}, 0x8000, 0x7ff, 0x0, 0x3, 0x2, 0x401, 0x34b4, 0x0, 0x3, 0x0, 0x20}, r0, 0xc, 0xffffffffffffffff, 0x2) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000240)={0x5000, &(0x7f0000000200), 0x0, 0xffffffffffffffff, 0x2}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x44818) io_submit(0x0, 0x0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0xc) socket$nl_netfilter(0x10, 0x3, 0xc) r5 = openat$pfkey(0xffffff9c, &(0x7f0000000080), 0x400040, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc"], 0x230}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYRESOCT], 0x230}, 0x1, 0x0, 0x0, 0x24048042}, 0x20) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) [ 2712.710669][T17303] Cannot find del_set index 0 as target 20:26:51 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x200000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2712.874381][ T1196] ieee802154 phy0 wpan0: encryption failed: -22 [ 2712.881252][ T1196] ieee802154 phy1 wpan1: encryption failed: -22 20:26:52 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1c00, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2712.993121][T17321] Cannot find del_set index 0 as target 20:26:52 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x11}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:52 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000120000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:26:52 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x1000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:52 executing program 3: eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syncfs(r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000200)) read$eventfd(r3, &(0x7f0000000040), 0x8) 20:26:52 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1d00, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:52 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x15}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2713.540820][T17371] __nla_validate_parse: 22 callbacks suppressed [ 2713.540842][T17371] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:26:52 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x2000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2713.774350][T17384] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 20:26:53 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1f00, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:53 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000140000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2713.914300][T17391] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. 20:26:53 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x3000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:53 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x1c}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2714.232595][T17408] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:26:53 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x2000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:53 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x5000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:53 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000160000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2714.546300][T17384] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. 20:26:53 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x1d}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2714.803740][T17436] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:26:55 executing program 3: eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$KDFONTOP_COPY(r2, 0x4b72, &(0x7f0000000040)={0x3, 0x1, 0x8, 0x5, 0x66, &(0x7f0000000600)}) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 20:26:55 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x4000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:55 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x11000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:55 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000180000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:26:55 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x4a}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2716.067139][T17460] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:26:55 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x4a00, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2716.165887][T17463] set_target_v0_checkentry: 11 callbacks suppressed [ 2716.165944][T17463] Cannot find del_set index 0 as target [ 2716.217555][T17471] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2716.310468][T17478] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2716.311657][T17481] Cannot find del_set index 0 as target 20:26:55 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x1d000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2716.422009][T17483] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. 20:26:55 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x58}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:55 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000190000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:26:55 executing program 3: r0 = eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000040)={0x3, 0xffffffffffffffff, 0x1}) sendfile(r1, r0, &(0x7f0000000080)=0xc56, 0xb277) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r0, r0) sendmsg$NFT_BATCH(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) dup3(r2, r3, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYRES32], 0x230}, 0x1, 0x0, 0x0, 0x40048010}, 0xc0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) [ 2716.638807][T17487] Cannot find del_set index 0 as target 20:26:55 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x5800, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:55 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x1f000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2716.931519][T17510] Cannot find del_set index 0 as target 20:26:56 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x88}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:56 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000600000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2717.120549][T17520] Cannot find del_set index 0 as target 20:26:56 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x5a01, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:56 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x88000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:56 executing program 3: eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0x3ec, 0x0, 0x8, 0x1, 0x7, 0x94f7, 0x0, 0x54753841, 0x41ff9b06, 0x5, 0x7f, 0x100, 0x100, 0xd11, 0x200, 0xfe000000000000], 0xd000, 0x1b84}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) [ 2717.444732][T17538] Cannot find del_set index 0 as target 20:26:56 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x9c}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2717.567276][T17550] Cannot find del_set index 0 as target 20:26:56 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x5c02, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:56 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0xec231a00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:56 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000f00000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:26:57 executing program 3: r0 = eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000, 0x13, r0, 0xaf34f000) io_submit(0x0, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) dup3(r1, r2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r0, 0x1, 0x2, r0}) [ 2717.953524][T17568] Cannot find del_set index 0 as target [ 2718.039385][T17577] Cannot find del_set index 0 as target [ 2718.039705][T17574] Cannot find del_set index 0 as target 20:26:57 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:57 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x6e02, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:57 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000fc0100000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:26:57 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:57 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0xb8}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:57 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0xff}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2718.572051][T17603] __nla_validate_parse: 16 callbacks suppressed [ 2718.572075][T17603] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:26:57 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x8800, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:57 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:57 executing program 3: eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) sendmsg$NFQNL_MSG_VERDICT(r1, 0xffffffffffffffff, 0x1) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x8181, 0x3) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r2, 0xc04064aa, &(0x7f00000003c0)={&(0x7f0000000300)=[0x0], &(0x7f0000000340)=[{}, {}, {}], 0x2097, 0x0, '\x00', 0x1, 0x3}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc"], 0x230}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x40, 0x3, 0x8, 0x401, 0x0, 0x0, {0x3, 0x0, 0x6}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x86dd}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x80000}, 0x804) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) [ 2718.947435][T17625] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 20:26:58 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a0104000000001c0200000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2719.056778][T17628] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. 20:26:58 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2719.124162][T17640] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. 20:26:58 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x3]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2719.229095][T17628] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. 20:26:58 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x8801, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2719.319857][T17640] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2719.332931][T17651] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:26:58 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x0, 0x2}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:58 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000300000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:26:58 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:58 executing program 3: eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000ca3f0000000000000000bb620a20000000000a0300000000000000ceca71ca3efcbb750c8cca34536e91615fb947d51219d2ee3f1871a7f56cbda071629caf74287b26379dc23478bb71950de4cdac655009f3bf09ad78d888594f3e9a093e8c43e5b3b537c88833aa1aff630ebdeef7920c15b0d166e61f0c829cb308d78ea07c5f491bf6bf5fd135621bb7b1aeeaf3e877531b8ede9e6d813c4c613a8e89cc37c6c7f3faaa9b2b2876b55c55e8cac5a03e6807c24fae0cdaab387aa6bce741e46b75b44be807408b2680928c525643129cb8c51a2efd16df2026"], 0x230}}, 0x0) dup3(r0, r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000800)={{0x14}, [@NFT_MSG_DELOBJ={0x4c, 0x14, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x5}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x650, 0x6, 0xa, 0x201, 0x0, 0x0, {0x7}, [@NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_RULE_COMPAT={0x1c, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0xa06}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x87}, @NFTA_RULE_COMPAT_FLAGS={0x8}]}, @NFTA_RULE_EXPRESSIONS={0x614, 0x4, 0x0, 0x1, [{0x68, 0x1, 0x0, 0x1, [@tproxy={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0xe}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x12}, @NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0xb}, @NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0xe}]}}, @tproxy={{0xb}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0x17}]}}, @log={{0x8}, @void}, @limit={{0xa}, @void}, @cmp={{0x8}, @void}]}, {0x4c, 0x1, 0x0, 0x1, [@flow_offload={{0x11}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}}, @flow_offload={{0x11}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz2\x00'}]}}]}, {0xbc, 0x1, 0x0, 0x1, [@exthdr={{0xb}, @void}, @redir={{0xa}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_REDIR_REG_PROTO_MAX={0x8, 0x2, 0x1, 0x0, 0x15}, @NFTA_REDIR_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0xa}]}}, @cmp={{0x8}, @val={0x74, 0x2, 0x0, 0x1, [@NFTA_CMP_DATA={0x68, 0x3, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x64, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_CMP_SREG={0x8, 0x1, 0x1, 0x0, 0xf}]}}, @dup_ipv4={{0x8}, @void}]}, {0x10c, 0x1, 0x0, 0x1, [@dup_ipv4={{0x8}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_DUP_SREG_DEV={0x8}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x13}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xe}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x16}]}}, @lookup={{0xb}, @void}, @hash={{0x9}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_HASH_DREG={0x8, 0x2, 0x1, 0x0, 0xc}, @NFTA_HASH_SEED={0x8, 0x5, 0x1, 0x0, 0x10000}, @NFTA_HASH_LEN={0x8}, @NFTA_HASH_MODULUS={0x8, 0x4, 0x1, 0x0, 0x7f}, @NFTA_HASH_DREG={0x8, 0x2, 0x1, 0x0, 0x1}]}}, @numgen={{0xb}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x13}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x9}, @NFTA_NG_DREG={0x8}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x101}, @NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0xffffff0a}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0xcba23e262068b01e}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x1b}, @NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x13}]}}, @tunnel={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_MODE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_MODE={0x8, 0x3, 0x1, 0x0, 0x2}]}}]}, {0x68, 0x1, 0x0, 0x1, [@immediate={{0xe}, @void}, @byteorder={{0xe}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_BYTEORDER_SIZE={0x8, 0x5, 0x1, 0x0, 0x14}, @NFTA_BYTEORDER_SIZE={0x8, 0x5, 0x1, 0x0, 0x7b}, @NFTA_BYTEORDER_SIZE={0x8, 0x5, 0x1, 0x0, 0xe6}, @NFTA_BYTEORDER_SIZE={0x8, 0x5, 0x1, 0x0, 0xa9}, @NFTA_BYTEORDER_SREG={0x8, 0x1, 0x1, 0x0, 0xa}, @NFTA_BYTEORDER_SIZE={0x8, 0x5, 0x1, 0x0, 0xd7}, @NFTA_BYTEORDER_LEN={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_BYTEORDER_LEN={0x8, 0x4, 0x1, 0x0, 0x59}]}}]}, {0xe8, 0x1, 0x0, 0x1, [@notrack={{0xc}, @void}, @tunnel={{0xb}, @void}, @redir={{0xa}, @void}, @tproxy={{0xb}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0x17}, @NFTA_TPROXY_REG_ADDR={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_TPROXY_REG_PORT={0x8, 0x3, 0x1, 0x0, 0xc}, @NFTA_TPROXY_FAMILY={0x8, 0x1, 0x1, 0x0, 0x1}]}}, @xfrm={{0x9}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_XFRM_DREG={0x8}, @NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x6}, @NFTA_XFRM_SPNUM={0x8, 0x4, 0x1, 0x0, 0x3}, @NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x6}]}}, @numgen={{0xb}, @void}, @connlimit={{0xe}, @void}, @quota={{0xa}, @val={0x28, 0x2, 0x0, 0x1, [@NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0x3}, @NFTA_QUOTA_CONSUMED={0xc, 0x4, 0x1, 0x0, 0x7}, @NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0xd44}]}}]}, {0x8c, 0x1, 0x0, 0x1, [@synproxy={{0xd}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_SYNPROXY_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x8}, @NFTA_SYNPROXY_WSCALE={0x5, 0x2, 0x2}, @NFTA_SYNPROXY_FLAGS={0x8}, @NFTA_SYNPROXY_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SYNPROXY_FLAGS={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0x5}, @NFTA_SYNPROXY_MSS={0x6, 0x1, 0x1, 0x0, 0xffc1}, @NFTA_SYNPROXY_WSCALE={0x5, 0x2, 0x5}]}}, @ct={{0x7}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0xc}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0x3}]}}]}, {0x124, 0x1, 0x0, 0x1, [@reject={{0xb}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_REJECT_TYPE={0x8}, @NFTA_REJECT_ICMP_CODE={0x5, 0x2, 0x8}, @NFTA_REJECT_ICMP_CODE={0x5, 0x2, 0x81}, @NFTA_REJECT_ICMP_CODE={0x5, 0x2, 0xe5}, @NFTA_REJECT_TYPE={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_REJECT_TYPE={0x8, 0x1, 0x1, 0x0, 0x2}]}}, @log={{0x8}, @void}, @meta={{0x9}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0xf}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_META_DREG={0x8, 0x1, 0x1, 0x0, 0xd}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0xd}, @NFTA_META_SREG={0x8, 0x3, 0x1, 0x0, 0x17}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x1b}, @NFTA_META_SREG={0x8, 0x3, 0x1, 0x0, 0x1}]}}, @dynset={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_DYNSET_EXPR={0x10, 0x7, 0x0, 0x1, {{0xb}, @void}}, @NFTA_DYNSET_SET_ID={0x8}, @NFTA_DYNSET_FLAGS={0x8, 0x9, 0x1, 0x0, 0x1}]}}, @tunnel={{0xb}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_MODE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_MODE={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0x1e}, @NFTA_TUNNEL_MODE={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0x8}]}}, @fwd={{0x8}, @void}]}, {0x94, 0x1, 0x0, 0x1, [@dup={{0x8}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xe}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xe}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x16}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xc}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x1d}]}}, @objref={{0xb}, @void}, @match={{0xa}, @void}, @fib={{0x8}, @void}, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x15}]}}, @quota={{0xa}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}}]}]}]}, @NFT_MSG_NEWRULE={0x4d4, 0x6, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_RULE_USERDATA={0xd3, 0x7, 0x1, 0x0, "d6ff21f6db6bff41f27bb9c18e445dd125253804a8bcd21375fc33074e803bc40ea03c8cd5c7570a40fc3a2e74a895641c4db73310a7598b83d875dd570206ee936b166cdbc60b3844041a5560dab7cbc0a770506112984657bf3ab59bac1d5818a5c18d2a716b021eb031dcda032f41349ac43a814db8db7ae78a3f77740aca865931e388a8754e466de2bd734d124d2c4d5f635571e933ae3adfc704d4a4f1efcbf8b91d0a9df81241feab06e972fd4b67adf76dceca14ac0734f73f298b230c4534f059dd19ac83fdcd2647be50"}, @NFTA_RULE_EXPRESSIONS={0x3e0, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@quota={{0xa}, @void}]}, {0xe8, 0x1, 0x0, 0x1, [@dup_ipv6={{0x8}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x11}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xd}]}}, @connlimit={{0xe}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x8001}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xfffffeff}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}}, @dup={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x15}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x14}]}}, @hash={{0x9}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_HASH_LEN={0x8}, @NFTA_HASH_OFFSET={0x8, 0x6, 0x1, 0x0, 0x10000}, @NFTA_HASH_MODULUS={0x8, 0x4, 0x1, 0x0, 0x4}, @NFTA_HASH_SEED={0x8, 0x5, 0x1, 0x0, 0x7}, @NFTA_HASH_LEN={0x8, 0x3, 0x1, 0x0, 0x49}, @NFTA_HASH_SEED={0x8, 0x5, 0x1, 0x0, 0xfffffff7}]}}]}, {0xa4, 0x1, 0x0, 0x1, [@quota={{0xa}, @val={0x68, 0x2, 0x0, 0x1, [@NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0x4}, @NFTA_QUOTA_CONSUMED={0xc, 0x4, 0x1, 0x0, 0x1f}, @NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0x5}, @NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0x5}, @NFTA_QUOTA_BYTES={0xc, 0x1, 0x1, 0x0, 0x5}, @NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x3}]}}, @byteorder={{0xe}, @void}, @bitwise={{0xc}, @void}, @payload={{0xc}, @val={0x4}}]}, {0x10c, 0x1, 0x0, 0x1, [@objref={{0xb}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_OBJREF_SET_SREG={0x8, 0x3, 0x1, 0x0, 0x16}]}}, @match={{0xa}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_MATCH_NAME={0x7, 0x1, '{+\x00'}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x5}, @NFTA_MATCH_NAME={0xa, 0x1, '^:-%%\x00'}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x6}, @NFTA_MATCH_NAME={0xa, 0x1, ',(\'-[\x00'}, @NFTA_MATCH_NAME={0x6, 0x1, '%\x00'}, @NFTA_MATCH_NAME={0x6, 0x1, '$\x00'}]}}, @redir={{0xa}, @void}, @dup_ipv4={{0x8}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0xf}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xa}, @NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0xa}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x12}]}}, @flow_offload={{0x11}, @void}, @socket={{0xb}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_SOCKET_KEY={0x8}, @NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SOCKET_KEY={0x8}, @NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x9}, @NFTA_SOCKET_KEY={0x8}]}}, @target={{0xb}, @void}]}, {0x134, 0x1, 0x0, 0x1, [@dynset={{0xb}, @void}, @notrack={{0xc}, @void}, @match={{0xa}, @void}, @osf={{0x8}, @void}, @target={{0xb}, @val={0xa8, 0x2, 0x0, 0x1, [@NFTA_TARGET_INFO={0xa1, 0x3, "ad97d8f872480afecbe17a731f204fea6cec5e24d4a8980d0ca49a2643eea3c588f0baf7899075d88f49ee7449c047d59cba4531300c86009beec49fa928b6fe7e1a0df5ad1795128030799acc502de9b81589bfc6719daebac47041a5773267e8c76081bb1a79d9599d1e2c4a5ecb3a4895af70ca85ad49a8f1951bf2a29f217821d329a62437f9ee5e1f311ac05251e5b5d335932375f1dd937eeadb"}]}}, @payload={{0xc}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_CSUM_OFFSET={0x8, 0x7, 0x1, 0x0, 0x401}, @NFTA_PAYLOAD_LEN={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_PAYLOAD_SREG={0x8, 0x5, 0x1, 0x0, 0xa}, @NFTA_PAYLOAD_CSUM_TYPE={0x8, 0x6, 0x1, 0x0, 0x1}, @NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_PAYLOAD_CSUM_TYPE={0x8}, @NFTA_PAYLOAD_SREG={0x8, 0x5, 0x1, 0x0, 0x17}, @NFTA_PAYLOAD_DREG={0x8, 0x1, 0x1, 0x0, 0xb}]}}]}]}]}, @NFT_MSG_NEWSETELEM={0x4c, 0xc, 0xa, 0x201, 0x0, 0x0, {0xa, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x84, 0x16, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x1}]}, @NFT_MSG_NEWSETELEM={0x39f4, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x39b0, 0x3, 0x0, 0x1, [{0x148, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_USERDATA={0x94, 0x6, 0x1, 0x0, "187f1c7bb848d00169348a1670e59684b4e3ff34f3e6b330efcb0a57fdf993dbe98ab5abd06f81496a9770276e9f578251399f36a7f6e70ef8ebce32dfe189082000173ffa385503237e144ff12afe66c7ed27cef88388af5516442c0593d4a6645e87edc12fc0a2c68513b6a0210bfe32ca29a5da15efcceaabbae271d9899501615950724b3ec50950edc0a763afbc"}, @NFTA_SET_ELEM_USERDATA={0x9f, 0x6, 0x1, 0x0, "dcd1896a99d47ee03e5cfd68805bd0d399c9d0274fecb615d056bb4adf3344fdda9c3c0971c3a40b4ad436daa529a6831da723de5d879215a1c2bc4a862311d1a61b37be9885df293e61620ddf1004d7a9b4be207c8d97e4192e241705f471ca030583a77385f1352141f1e9a135a2d830c306bcb11034684cafeee3b9651067b99b86167d32070601882753057855c610595526c4f8b51c2aae9b"}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x2270, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x1264, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VALUE={0x3a, 0x1, "acf714e6fc0947023cb9e016a6c191596df779f9e149e9ab5873cf58c8af5a4100e81cb4d53dbb669b0260b11f1d1aa1f15b4c45293e"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0xe9, 0x1, "1495d9b0b1994766b0393e80ced614b4bc3be0ccb1732814c2b2f1fae03299de9d3aa3f23951e74cc6dfe4e0f9fd804771e2d60e026d977eaa823046f773b67a2897abdf32361409dfd23e985b1e85cb58084aee7d473b06d8c32e1462e52f4b0b05ed2677a0cab340e45d4d16ddd0504b728ae39fbf56a6e83043e579ca85e05cdba7e54fd560d47f248a900d7bbf4ba6f01179be9b4a552ebb059ca25d9520e31982660e0a9f3f529536a22ad3c61ea87b6d81e17816677fd9385b55e7eb3231e28db7e8f4c09a30255301f422a18d1484bf2038fc607f63542934a618b9187dcce0ecbe"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VALUE={0x21, 0x1, "9ad8ef766120a4f620fe19108fa342a6e78c6e94b598a4f75848f99408"}, @NFTA_DATA_VALUE={0x71, 0x1, "4b33d24ac53d99aaefb9989d60ac8bb59286ff5a29f109ae9d6e7be5aa90d7ef863d2a358a57dff4f8bc4018d2d19f20bd88824ac4b625b78399880abcee64e007e1adf0d3a7cf7e7e576ea0f99a7b4a4903c7920192de9d214071b905a215f692ff1ee01ac4fec94c9c67e2d5"}]}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_USERDATA={0x1004, 0x6, 0x1, 0x0, "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"}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x104, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_KEY_END={0xdc, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x68, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x2}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x4}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x6c, 0x1, "7137ae00e0fc6d04079220003069685ddb35c080f9820eb13165636f2c54de49c202aaba8a74d259644ab68ae660d6170edee7657ac3060cebea7c6f14f9cfbe7d52155c5b10c1aecd15a3ad58eac862b6ca2a8cbfd35c781745721cd0888eff855ff26d974f65a6"}, @NFTA_DATA_VERDICT={0x4}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xc2}]}, {0x4}, {0x12f0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_DATA={0x12cc, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x29, 0x1, "866ae71b13648fa2790cd47918a34edb4e3ae9e42396a45ff50d8ac2dd24abf02823641213"}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x65, 0x1, "efaee93b94b5f363a4233dcd315a8427f55a207067003169599c5b47e3c4ad0e5a886275a03590c9f0f1b6c3eb6cd5fce49173bb045f119f3b51c36a5d00465ae688f898eab4c90e7b7484dfb618bde963488f49a2a9c58cc67c0f48f19ed2f7ee"}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x7e, 0x1, "361ead854c0d0c6282495970217b074ccb3af7113a9ebece2052e5d221cd16059fac3365e6fde053715352c57773869b5a4bd3d79eb36b8f372187e505f312b970064e375b94abca7ae0f89cb9e7c808496574a965a009995c9634db5f7602feb6ad90d07bc15c9c0779960f88c177e564ca08b6a04b448416dc"}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VALUE={0x44, 0x1, "fbe8f1078367c687ea01586255ff8ad94c0cc1feb716597e6ab4a127be03bf71dbf36fd8b526d52209fd78b114e7745490e9ee475b12942233dc91951c97e056"}, @NFTA_DATA_VERDICT={0x70, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x98, 0x1, "6d97b5b9fd82a2cf612a79e65c8f23874cc8d622e128c4cea5e25cc7933de45838a7e75753efedf4a242c6d358697478cdafbf318d39fa9e52fd691b53cea8f2bf9d69ed778244b7853f181ce2bb27a182eddba4c7f628726a42dc05a72f1bd660696d6d989511060f438895b47d06c7661d8965ed7b1f207c7dbba7406ad439f80164e082c537cffec38d95333467092d79c24e"}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xffff}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}]}, {0x1b0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_DATA={0x190, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x3c, 0x1, "813b13acf1c59b71d0f27acdd1e5ade6675ee6cc2d95d7d2552fdae009d4f6fc10ca8bab8a8aa39a6ccbfb8b43f3d5c56ff0ed5763728247"}, @NFTA_DATA_VALUE={0x40, 0x1, "56b3182d20b5303d173e81fef1905386c3b1981d27dcc8a6da132e4a9a2603a4ed230e67cb70b64888e5e303b47a9d7332e6ab03a7768112e0d5d730"}, @NFTA_DATA_VERDICT={0x68, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0x83, 0x1, "816342fcac25474bb76d3fae60a614896309ae08cc9988a748453eae52e7d27380164ceabc281a2642eadde76c015fa6e9eb8f032d6a854da73638b1e3ca5f0e8dc7aa426f4e6ce6ad1d5e78baf7e1a1a48334740e512bdb427eb3c5c0d93aef02bae1c228e47acf1a43f07be9c5752e5fcdf4e4795d4b4633faa180174671"}]}]}, {0x34, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xffff}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x1ff}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}]}]}]}, @NFT_MSG_DELOBJ={0x58, 0x14, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x46b4}, 0x1, 0x0, 0x0, 0x20048000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x230}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 20:26:58 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x9c00, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:59 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x11]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:59 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0xb800, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2720.220727][T17684] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:26:59 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x0, 0x3}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:59 executing program 3: eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) r2 = dup3(r0, r1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x8a6}}, './file0\x00'}) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES16], 0x230}, 0x1, 0x0, 0x0, 0x20000000}, 0x44040) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 20:26:59 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000500000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:26:59 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x1d]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:26:59 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0xb801, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2720.790979][T17719] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2720.917484][T17725] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:00 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x0, 0x4}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:00 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x88]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:00 executing program 3: eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syncfs(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc"], 0x230}}, 0x0) pidfd_getfd(r0, r1, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) dup3(r2, r3, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) [ 2721.201150][T17743] set_target_v0_checkentry: 12 callbacks suppressed [ 2721.201217][T17743] Cannot find del_set index 0 as target 20:27:00 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000600000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:00 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x40000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:00 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x0, 0x7}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2721.363152][T17751] Cannot find del_set index 0 as target 20:27:00 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x300]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2721.788132][T17776] Cannot find del_set index 0 as target [ 2721.813137][T17775] Cannot find del_set index 0 as target 20:27:00 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x500]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:01 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1a23ec, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:01 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000700000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:01 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x0, 0x8}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2722.013539][T17788] Cannot find del_set index 0 as target [ 2722.207188][T17794] Cannot find del_set index 0 as target 20:27:01 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x1100]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2722.332769][T17810] Cannot find del_set index 0 as target 20:27:01 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x200000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:01 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000900000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2722.539344][T17813] Cannot find del_set index 0 as target [ 2722.712008][T17826] Cannot find del_set index 0 as target [ 2722.731192][T17820] Cannot find del_set index 0 as target 20:27:02 executing program 3: eventfd2(0x0, 0x0) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000080), 0x800, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000100)={0x8000, &(0x7f0000000040), 0x8, r0, 0x1}) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) dup3(r1, r2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 20:27:02 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x1d00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:02 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:02 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x0, 0x11}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:02 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000b00000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2723.809690][T17846] __nla_validate_parse: 11 callbacks suppressed [ 2723.809713][T17846] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:03 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x0, 0x15}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:03 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x1f00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2724.021107][T17857] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2724.120143][T17863] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. 20:27:03 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000c00000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:03 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x2000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2724.224958][T17863] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 20:27:03 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:03 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc01cf509, &(0x7f0000000040)={r0, 0x8, 0x6, 0xd6}) sendmsg$NFT_BATCH(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_DELOBJ={0x2c, 0x14, 0xa, 0x301, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x2c, 0x18, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELSET={0x38, 0xb, 0xa, 0x101, 0x0, 0x0, {0x5}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x3d}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x17}]}, @NFT_MSG_NEWFLOWTABLE={0x3c, 0x16, 0xa, 0x0, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x16c, 0x16, 0xa, 0x801, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xffffffff}]}, @NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'caif0\x00'}]}]}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HOOK={0xdc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x68, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vlan0\x00'}, {0x14, 0x1, 'veth1_to_bridge\x00'}, {0x14, 0x1, 'wlan0\x00'}, {0x14, 0x1, 'lo\x00'}, {0x14, 0x1, 'bridge_slave_1\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1\x00'}, {0x14, 0x1, 'veth1_to_team\x00'}, {0x14, 0x1, 'bridge0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x81}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x8000}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xffffffff}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}]}], {0x14}}, 0x260}, 0x1, 0x0, 0x0, 0x81}, 0x40004) io_submit(0x0, 0x0, 0x0) r3 = syz_open_dev$ttys(0xc, 0x2, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) dup3(r3, r4, 0x0) sendmsg$NFQNL_MSG_CONFIG(r4, &(0x7f0000000680)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)={0x54, 0x2, 0x3, 0x801, 0x0, 0x0, {0x7, 0x0, 0x9}, [@NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x8}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x9}, @NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x23}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x9}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x10001, 0x1}}, @NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x1f}}, @NFQA_CFG_QUEUE_MAXLEN={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x41}, 0x24004045) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) [ 2724.563547][T17882] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:03 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x0, 0x1c}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:03 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x3000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:03 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x8800]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:03 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000e00000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2724.927126][T17900] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 20:27:04 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x0, 0x1d}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2725.067903][T17908] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2725.127032][T17908] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2725.152026][T17920] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:04 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x4000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:04 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x1a23ec]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:04 executing program 3: eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x18) sendmsg$NFT_BATCH(r3, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_NEWRULE={0x134c, 0x6, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x6}, [@NFTA_RULE_EXPRESSIONS={0x1254, 0x4, 0x0, 0x1, [{0x1210, 0x1, 0x0, 0x1, [@socket={{0xb}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0xa}]}}, @tunnel={{0xb}, @void}, @hash={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_HASH_LEN={0x8, 0x3, 0x1, 0x0, 0x81}, @NFTA_HASH_LEN={0x8, 0x3, 0x1, 0x0, 0xb8}]}}, @cmp={{0x8}, @val={0x1114, 0x2, 0x0, 0x1, [@NFTA_CMP_SREG={0x8, 0x1, 0x1, 0x0, 0xb}, @NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CMP_DATA={0x88, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x84, 0x1, "47147405032d236657f0b41643e1036eb7eb1cde423020d4d43ea52fae3ad5a7093702b6d67382e88844923c96e1dc188e845717c5752151a336d447e2c8ac1f394914d4cf7715d774d88f486f9faca460280aab0c701263e0f5053c0dd2e00c6c090e25d70d7151917a74b3853440c6416a4df32fb8ebb2d95899dd5421125f"}]}, @NFTA_CMP_DATA={0x1068, 0x3, 0x0, 0x1, [@NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VERDICT={0x60, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_CMP_SREG={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_CMP_OP={0x8, 0x2, 0x1, 0x0, 0x5}]}}, @target={{0xb}, @val={0x88, 0x2, 0x0, 0x1, [@NFTA_TARGET_INFO={0x1a, 0x3, "9f9d6a045b4353709f5d3ebfccdb567be8288768de12"}, @NFTA_TARGET_INFO={0x14, 0x3, "0bee2ee00efebb5b36bebaaab1bbba43"}, @NFTA_TARGET_NAME={0x7, 0x1, '{/\x00'}, @NFTA_TARGET_INFO={0x2a, 0x3, "4b495ebe5ebc5b18dc2443f61e3661dd1b649194991d4da437307c2058654962f05b5be93fd2"}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x10001}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x80000001}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x9}]}}, @hash={{0x9}, @void}, @masq={{0x9}, @void}]}, {0x18, 0x1, 0x0, 0x1, [@rt={{0x7}, @void}, @target={{0xb}, @void}]}, {0x28, 0x1, 0x0, 0x1, [@byteorder={{0xe}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_BYTEORDER_SREG={0x8, 0x1, 0x1, 0x0, 0xb}, @NFTA_BYTEORDER_SIZE={0x8, 0x5, 0x1, 0x0, 0x35}]}}]}]}, @NFTA_RULE_USERDATA={0xd9, 0x7, 0x1, 0x0, "250e63d41d374cb0b532d892261225e4884b7d23b2059ab74b2639946bf2ba4eccda2a110313f0948242f5c5b2ef323a13701bd683b5686c29faf49dc7006878dddbb293219fb6526a232c1b9e1ff306d29066fdd2b21d1468b9033ee70840ed9bf1a58963fcbe59db6801f2c35bfb1c87b5e3c2cadbbbe7a730b5f2c06d730cf6f72f06bab75619a2b40745f6737eb6f99982c473d2b706d7ec63186c445c01e62d7f83904b3d719c0fa1c9502ab804405a1721053d6aa38d9a655e7793d684328f2299cc0f822f6fa7fc18a65d9de49e885f5539"}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x1}]}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFTA_RULE_COMPAT={0x3c, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x892f}, @NFTA_RULE_COMPAT_FLAGS={0x8}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x201}, @NFTA_RULE_COMPAT_FLAGS={0x8}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x11}, @NFTA_RULE_COMPAT_FLAGS={0x8}, @NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x88}]}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x4}]}, @NFT_MSG_DELRULE={0x38, 0x8, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x3}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELOBJ={0x20, 0x14, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0x7}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x301, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x1488}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 20:27:04 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x0, 0x4a}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:04 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000a40e00000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:04 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x7000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:04 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x200000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2725.816649][T17960] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 20:27:05 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x8000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:05 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x0, 0x58}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:05 executing program 3: eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000040)=""/87) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 20:27:05 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000f00000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:05 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:05 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2726.448732][T18001] set_target_v0_checkentry: 14 callbacks suppressed [ 2726.448792][T18001] Cannot find del_set index 0 as target [ 2726.506223][T18006] Cannot find del_set index 0 as target 20:27:05 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x0, 0x88}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2726.695929][T18016] Cannot find del_set index 0 as target 20:27:05 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000001200000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:05 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0xc030000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:05 executing program 3: eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r1, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0x4c, 0x0, 0xb, 0x401, 0x0, 0x0, {0xc, 0x0, 0x2}, [@NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4004000}, 0x20040010) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000b5aa56d77cfdcf566ce0105cae2bf4c0500314ef22a6d85f2ff4aa349bd7b95aaad5aaecb0a7dbd48e31267d31f14080c76e7eccfa1757b3ba10c3ba6533031183a15b11046e986f8a55a8d0b4c63064845b1673fd3d90a7eac79a64c8d2094a2d3daf963a0236b655e5260e46b4e33996d91d43482900"/161], 0x230}}, 0x0) dup3(r0, r1, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_NEWSET={0x34, 0x9, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_POLICY={0x8}]}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0xc, 0x0, 0x4}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}]}, @NFT_MSG_NEWSET={0x240, 0x9, 0xa, 0x301, 0x0, 0x0, {0xa, 0x0, 0xa}, [@NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x7f}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x8}, @NFTA_SET_TIMEOUT={0xc}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_DESC={0x14c, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x4c, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xdcd7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfdb}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x20}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x800}]}]}, @NFTA_SET_DESC_CONCAT={0xd4, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x38000000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80}]}, {0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x20}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xef5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x70}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xb9e5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9d2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x10000}]}, {0x3c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x400}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x37e}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7765}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffffffd}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2400000}]}]}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x1f}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0xaa}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x1}]}, @NFTA_SET_USERDATA={0xa1, 0xd, 0x1, 0x0, "1438d32b9a80686a84facd344d5cbb0203da642ae961321a7707c85db6d4cc22b59b91b753fb5c3700b2399c3b4aee66788dd0bc31c56d92eb8454cc5bccca7d2fb3e6f9c3fe3bf2cf00705450a787b45eb7977d0334a367eb1a055bbaa5c6177960b9f09c39aaf99c5fb14aafe2e2db1054aa858213946de5b353d6a4795a921b9b5e52c5b478a8e9d34a3367265a5224e22887e22b8dd76455e6fd18"}, @NFTA_SET_POLICY={0x8}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x9}]}, @NFT_MSG_NEWFLOWTABLE={0x110, 0x16, 0xa, 0x201, 0x0, 0x0, {0xa, 0x0, 0x2}, [@NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_HOOK={0xe4, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x13}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wlan0\x00'}, {0x14, 0x1, 'macvlan0\x00'}, {0x14, 0x1, 'bond_slave_0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'veth1_virt_wifi\x00'}, {0x14, 0x1, 'bridge_slave_0\x00'}, {0x14, 0x1, 'ip6gretap0\x00'}, {0x14, 0x1, 'gretap0\x00'}, {0x14, 0x1, 'ipvlan1\x00'}, {0x14, 0x1, 'wg0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x4}]}]}, @NFT_MSG_DELSETELEM={0x17d4, 0xe, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x9}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x1748, 0x3, 0x0, 0x1, [{0x108, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY_END={0xf4, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xd2, 0x1, "e038574e0cbba5909b8dc43643f3dcaa325b91406be087fff384f581162a400c855365a6817967a0f9cb74f1aa938acb2deeab57336ae9d90c5386aa7925b8d79f9d72582a8a5a98c7908a8d3c21371d4e780f3c420917e298a47cf979650a4db88096e730ea484152ee041e2a204e780a6c651d5a78fad54396760b12c0fbc66c0fec0e8d87508c71adf4ed80c8435703bd969a804e5b3a3c9c08f21c67d1365d9c6aa7b055b8ea3e2db69f37bfd5b3f476bc88b181c64cf6ed19e0ce5097af7dcf9d9677d5753520f515fc61c5"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x3}]}, {0xa0, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY_END={0x90, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0x8a, 0x1, "f5757e0fea18d7a0db844d7f95b7dd6f22ad94231989ea59769451c37236c2dd1a86ab38c71f3e3e97708829257e155a12e00d0a6c98f2c759ea68ae9ca330ea7d789e8d390f7b3d8492d6993fe70a6b2b7642ebb2bda5f5f719563f05e50b0b6781e03597952dfa0b1f87a88651c95f34b5995ee2a8c1bc1c9aab32ebfd9d6eb87389d5eb00"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x4}]}, {0x159c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x324, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xd, 0x1, "d50247d56fb61c22d3"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0xb7, 0x1, "05ddec1c8d2f3190a4fd49af056d5cb1950f071954171e33a92f36bca47d405dd029a59e0bf0eb5bdf1bdd9f0552f793fde9d3e6593975c6809ae2b1a41e948855b2a9c6e6bdde1f75359f4c6e603d58495955d55bf09e34307efbdbbc3aade018637acd72ed732016fa0f2c52791bd874946888b49c3c475604ff0632b774efc316f606669c9ba4b8b34c14d970600a2d427450ec4d1943583ebafb8b2ab5eaa483c54ea7584d4083bc509a32e28f3e66f9c2"}, @NFTA_DATA_VALUE={0x83, 0x1, "01a19ed2c65e4eb3995c1bd74a48bb88908c55c676c9cb5d63cabd40d4d9496235c7a6531be37e60a7ff4c35ab1ead10841be1b2712edf7cd01cf9d262bea1797f404fd4c06ada54dca0865318f034a4f8431b42b130da1f6bfa4794870574271a095b700033c9c0821e94a0a5a390e19e1db684e8d4441a67c425ed662b27"}, @NFTA_DATA_VERDICT={0x60, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x50, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xa9, 0x1, "be50b36899d89739a7ded891b2c3d5d580c3d0f4bfaac41132896b545d2b91072bc61ce821702fc0a3c9b3ca12a2a6f13e28f8f7604643fcf104ccbb125edc39ce078d5d870ff5a293b209dba115c766c320c6be7c96615c06b38eff5ccac00027c7a09e209e90ee3a832e15d40dce4f2b2f19e020e84da941e647d196b59153486d674ec36870e32e6f1a86249d1e862e57c715eb9524d1310f01f63b2e6fcd57c4162aaa"}, @NFTA_DATA_VALUE={0x37, 0x1, "1ec718d9e6599dd2412dd866eb2ec88b793daed3563e1bdcf9b7a5c92f0044e3c904cfee60021edae2b5dd0c8c8c8bba8f30d9"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xe39}, @NFTA_SET_ELEM_KEY={0x1268, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VALUE={0xc7, 0x1, "1c5b0688145124a863bcb01c9c8502f2276b4b67de78466e3690d99a4c5cd98c5d4bb31473a1e2b1fd56c97746703c2bd46148378ead4cd5011e4cfe735cd4619863e7b611d8d614d4719e917c7b87e345638eb68be564a017b6cda99beeb5fbcd1ba4815c81319238e89dfbaa78ea717442a4b9f68ac51eb8a09e9cb8627191149d40236e40ab362aaed8364e9f6397da5e912bf8096f86e7d691f9b32d49e82c40378f6a03d7cd83a2d9b95cef1b7cc50800093bf6c348a7c41c32d09985abe1cfff"}, @NFTA_DATA_VALUE={0x81, 0x1, "102c07d5da3d233c8ff2a3867be46ab0e9bc28e7c00fcb3f2595468d495070eb510f3d5c3eb79974b85fea484afb0de98e14bdb76a92c448839070ec4903a283c0f73fb2cf90c15d210b310c343412ddc6ed74012f44b1057b8d4040f168c50a9b705d81f0f3635de4f894b40fbe3c761ca309b97e687196d34bdb61f9"}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x6}]}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}]}]}]}], {0x14}}, 0x1ba0}, 0x1, 0x0, 0x0, 0x4004000}, 0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 20:27:06 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x3000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2726.957932][T18025] Cannot find del_set index 0 as target 20:27:06 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x0, 0x9c}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:06 executing program 3: perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x7, 0x31, 0x0, 0x2, 0x0, 0x3, 0x20800, 0xa, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0xfffffffffffffffb, 0x2}, 0x1000, 0xd8, 0x7f, 0x6, 0x8, 0x200, 0x9bc3, 0x0, 0x20, 0x0, 0x8}, 0x0, 0x2, 0xffffffffffffffff, 0xa) eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) r2 = dup3(r0, r1, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x0, 0xee01}}, './file0\x00'}) sendmsg$NFT_MSG_GETSETELEM(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, 0xd, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x3}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008000}, 0x40880) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x148, 0x30}, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r6 = pidfd_open(0x0, 0x0) ioctl$FS_IOC_SETVERSION(r6, 0x40047602, &(0x7f0000000400)=0xe441) [ 2727.269145][T18045] Cannot find del_set index 0 as target 20:27:06 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000001400000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:06 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x11000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2727.448823][T18056] Cannot find del_set index 0 as target 20:27:06 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x0, 0xb8}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:06 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2727.807631][T18078] Cannot find del_set index 0 as target 20:27:07 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000001600000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2727.871434][T18080] Cannot find del_set index 0 as target 20:27:07 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x11000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:07 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [], 0x0, 0xff}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:07 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x15000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:07 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040), 0x3, 0x88001) io_submit(0x0, 0x2, &(0x7f00000001c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0x3, r1, &(0x7f0000000080)="0b32b54e947989", 0x7, 0x0, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x4, r0, &(0x7f0000000300)="9079c1cdf0088595745f012c835dfdb57c925b213aee61c3b73585409b9689559474168de48872ddbb9b1fa7611c8f28765bb9fa7dbeb1ddbb6762279809b10a7078f23c1bbd2c4c69a66a429f2490ac606460738ab5fc06e7eed0b5774cef217af08ef7fadcd7fdcfea4b7eb551caa5a21644a0485c2df8d29a5a333e4942ba55aaece60f3ea23ed669cbb2988743833858ee96ac91848fa5fc6454a3c7cf92e0ac479af14bafbeb831ed88c78ad40539eb5347b4fd9b6e557f18ecc90b580f6862d1649041aae234e86c7f4458354de040f36cac6d08abd0c58c28a13cbdf7def3d4573f64", 0xe6, 0x5855, 0x0, 0x2, r0}]) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) io_submit(0x0, 0x7, &(0x7f0000001bc0)=[&(0x7f0000000780)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, &(0x7f00000006c0)="d976ea66e778e4383eaa7762b697ea003dd8a6f0f6274429abb0c9b81fd05b3e389ebad06345864ce58b83fc888b355efacc1f4432bf92c0ca31693c24936f1f5394a3802c3486cbd4e4a206aa99468bdae61fab53923a6828e6f5e963522bdd96bcc03ffd66ef287270b6101b4bfd77dacb62488d4d474ef9d6b7c6", 0x7c, 0xff, 0x0, 0x3}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x8, 0x6, r0, &(0x7f00000007c0), 0x0, 0xbb, 0x0, 0x3}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x2, 0x80, r2, &(0x7f0000000840)="04282a238fcf6918e5b0492c704c7f599ee99b3d5c3c42129b7d495f3e91c759820a75de52fad1192daefd2344c67ba28fb2586e80c7b5abc3a6ba7b82a5bf3caf6730aaccfe877607e44f682f4ad3d3a5e9773143e84109898812f31ab4a16b01da49689925aaab67f864c6e36f78e9459c20bb26c75e6593e8fe83c4c36a02bb8d51ec2730f004c2d28856ddf824dbe2e01941a6558a646cfdcc9695c47248822ead4be7126e", 0xa7, 0x80, 0x0, 0x2}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x2, 0x101, 0xffffffffffffffff, &(0x7f0000000980)="015d529f43a0cb0d7108ec27bbbc438488fba190e8d6f831931dbdaf06d0a05934a6af5f3c838d7db443bf1fc3271371364972c58804e072f47473521608eae88b4abe13040c337097", 0x49, 0x80, 0x0, 0x2}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x2, r2, &(0x7f0000000a40)="0f", 0x1, 0x7f, 0x0, 0x2}, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x1, 0x8000, 0xffffffffffffffff, &(0x7f0000000b00)="6ecd61c14a809c81b1c6239ba0f95a7cbb9511a70a82ef9168cf5194da15f7d8c2241833e1328850f1e30d71aaa3eb96ed7b70100b1d7660fb6b0f7a4de7", 0x3e, 0x8, 0x0, 0x1, r0}, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x5, 0xa40, r1, &(0x7f0000000b80)="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", 0x1000, 0xff, 0x0, 0x2}]) r3 = syz_open_dev$ttys(0xc, 0x2, 0x0) r4 = openat$proc_capi20ncci(0xffffff9c, &(0x7f0000000600), 0x85800, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc"], 0x230}}, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r5) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) r7 = dup3(r3, r6, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r7, 0xc01864c6, &(0x7f0000000440)={&(0x7f0000000400)=[0xffffffc0, 0x6, 0x0, 0x9, 0x1f], 0x5, 0x0, 0x0, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r9, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x44, 0x3, 0x8, 0x401, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x4}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x800) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) [ 2728.252238][T18106] Cannot find del_set index 0 as target [ 2728.286972][T18105] Cannot find del_set index 0 as target 20:27:07 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:07 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1c000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:07 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000001800000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:07 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x1d000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:07 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x2, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:07 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1d000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:08 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x1f000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:08 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000001900000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:08 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1f000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:08 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x3, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2729.340695][T18184] __nla_validate_parse: 31 callbacks suppressed [ 2729.340718][T18184] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:08 executing program 3: eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc"], 0x230}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e708000240000000013000038073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc00"/216], 0x230}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x3, 0x8, 0x301, 0x0, 0x0, {0x2, 0x0, 0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x44804) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 20:27:08 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x88000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2729.597855][T18194] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 20:27:08 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x4, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2729.728273][T18200] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. 20:27:08 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000021c00000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:08 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x40000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2729.802407][T18206] netlink: 332 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2729.812175][T18206] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2729.883551][T18212] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. 20:27:09 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0xec231a00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2729.957772][T18200] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2730.008141][T18194] netlink: 332 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2730.017662][T18194] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 20:27:09 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x7, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2730.161292][T18206] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.3'. 20:27:09 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x4a000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:09 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:09 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000001f00000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:09 executing program 3: r0 = eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) read$eventfd(r0, &(0x7f0000000040), 0x8) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$ttyprintk(0xffffff9c, &(0x7f0000000080), 0x80102, 0x0) ioctl$TCFLSH(r3, 0x540b, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) dup3(r1, r2, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc984c05286ce2a9a6f09c484e3b05479ce8"], 0x230}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 20:27:09 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x8, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:09 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:09 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x58000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:10 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000006000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:10 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:10 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x11, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:10 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x5a010000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:10 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:10 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a0104000000000ea400000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2731.505183][T18297] set_target_v0_checkentry: 16 callbacks suppressed [ 2731.505249][T18297] Cannot find del_set index 0 as target [ 2731.530986][T18308] Cannot find del_set index 0 as target 20:27:10 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x15, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:10 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x5c020000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:11 executing program 3: eventfd2(0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008ea0900010900020073797a31000000000000000000000000000000000800054000000002ac01118008000100636d7000a00112bf6d36cc11fc8602800800024000000001080001400000000e08000140cd7827e708000240f11ea15917cbd35ae1c9e6feb0b3b300000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc524f2fd0ee643933c447eca5"], 0x230}, 0x1, 0x0, 0x0, 0xc004}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xa, 0x810, r0, 0xef14f000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a0300000000000000"], 0x230}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000100001000000000000000000faff000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a0010280080002400000000108000171d4cda90c6ae4400000000e08000140cd7813e70800024000000001300003800300028008000180fffffffc2900020073797a320000000008000180fffffffb0900020073797a310000000008"], 0x230}, 0x1, 0x0, 0x0, 0x40010}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac011180080001f0585032add800636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a32005b3282e298bff09efffffb0900020073797a310000000008000240000000dc"], 0x230}, 0x1, 0x0, 0x0, 0x20000801}, 0xd4) socket$xdp(0x2c, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) dup3(r0, 0xffffffffffffffff, 0x80000) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x230}}, 0x4048014) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 20:27:11 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2731.980460][T18324] Cannot find del_set index 0 as target [ 2731.986617][T18325] Cannot find del_set index 0 as target 20:27:11 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x6e020000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:11 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a01040000000000f000000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:11 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1c, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:11 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000040)="3900000013001104680907000000000f0000ff3f04000000170a001700000000040037000a00030014917c82aa75b9a64411f6a4ee1ee438d2", 0x39}], 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000006d780)={0x0, ""/256, 0x0, 0x0}) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, r6}, {}, {r5}, {r5}, {}, {}, {0x0, r6}, {}, {r5, r6}, {0x0, r6}, {}, {}, {0x0, r6}, {}, {r5, r6}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {r5}, {0x0, r6}, {r4}, {}, {r4}, {0x0, r6}, {}, {}, {r4, r6}, {}, {}, {}, {r5, r6}, {}, {r4, r6}, {}, {}, {r5}, {}, {}, {}, {}, {r5}, {}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {}, {}, {}, {}, {r4, r6}, {}, {}, {}, {}, {}, {}, {r5}, {r4}, {}, {r5}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {r5}, {r4, r6}, {}, {}, {r5, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r4}, {r4}, {}, {0x0, r6}, {r4, r6}, {0x0, r6}, {}, {}, {}, {}, {}, {r4}, {}, {}, {r4}, {0x0, r6}, {}, {}, {0x0, r6}, {0x0, r6}, {0x0, r6}, {r5}, {}, {0x0, r6}, {}, {}, {}, {r4, r6}, {r5, r6}, {0x0, r6}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {r5, r6}, {r4}, {0x0, r6}, {}, {0x0, r6}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {r5}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {r5}, {0x0, r6}, {}, {}, {}, {}, {}, {r4, r6}, {r5}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {r5}, {0x0, r6}, {}, {r5, r6}, {}, {}, {r4}, {}, {}, {r5}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {r4}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {0x0, r6}, {}, {}, {}, {0x0, r6}, {}, {}, {r4}, {}, {r4}, {r5}, {}, {}, {}, {r4}, {}, {}, {r5}, {r4}, {}, {}, {}, {r5}, {r5}, {r4}, {0x0, r6}, {r5}, {}, {}, {}, {}, {}, {r4, r6}], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x0, "67a468663fd339"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f00000519c0)={{0x0, 0x8001, 0x7, 0x10001, 0x7f08, 0x6, 0x3, 0x8001, 0x2, 0x7, 0x7f, 0x8f9, 0x4, 0xffffffffffffffe0, 0xf}, 0x8, [0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000051a40)={0x6, [], 0x8, "d71ac81a0dba7c"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000052a40)={{0x0, 0x5, 0xfff, 0x1a, 0x3, 0xffffffff, 0xfffffffffffffffe, 0x40, 0x2, 0x6, 0x101, 0x7fff, 0x7, 0xffffffffffffffe0, 0x800}}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000053a40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000054a40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000006d780)={0x0, ""/256, 0x0, 0x0}) r9 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r9, 0xd000943d, &(0x7f0000058c40)={0x0, [{}, {0x0, r12}, {}, {r11}, {r11}, {}, {}, {0x0, r12}, {}, {r11, r12}, {0x0, r12}, {}, {}, {0x0, r12}, {}, {r11, r12}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {r11}, {0x0, r12}, {r10}, {}, {r10}, {0x0, r12}, {}, {}, {r10, r12}, {}, {}, {}, {r11, r12}, {}, {r10, r12}, {}, {}, {r11}, {}, {}, {}, {}, {r11}, {}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {}, {}, {}, {}, {r10, r12}, {}, {}, {}, {}, {}, {}, {r11}, {r10}, {}, {r11}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {r11}, {r10, r12}, {}, {}, {r11, r12}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {r10}, {r10}, {}, {0x0, r12}, {r10, r12}, {0x0, r12}, {}, {}, {}, {}, {}, {r10}, {}, {}, {r10}, {0x0, r12}, {}, {}, {0x0, r12}, {0x0, r12}, {0x0, r12}, {r11}, {}, {0x0, r12}, {}, {}, {}, {r10, r12}, {r11, r12}, {0x0, r12}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {r11, r12}, {r10}, {0x0, r12}, {}, {0x0, r12}, {0x0, r12}, {}, {}, {r11}, {0x0, r12}, {r11}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {0x0, r12}, {}, {r11}, {0x0, r12}, {}, {}, {}, {}, {}, {r10, r12}, {r11}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {0x0, r12}, {}, {}, {r11}, {0x0, r12}, {}, {r11, r12}, {}, {}, {r10}, {}, {}, {r11}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {0x0, r12}, {}, {}, {}, {0x0, r12}, {}, {}, {r10}, {}, {r10}, {r11}, {}, {}, {}, {r10}, {}, {}, {r11}, {r10}, {}, {}, {}, {r11}, {r11}, {r10}, {0x0, r12}, {r11}, {}, {}, {}, {}, {}, {r10, r12}], 0x0, "2156816c73038c"}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050d40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}], 0x0, "67a468663fd339"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000055a40)={0x0, 0x0, "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", "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"}) 20:27:11 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x88000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2732.413240][T18345] Cannot find del_set index 0 as target [ 2732.483799][T18351] Cannot find del_set index 0 as target 20:27:11 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb800]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2732.571490][T18358] Cannot find del_set index 0 as target 20:27:11 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1d, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:11 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a01040000000001fc00000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2732.678022][T18361] bridge0: port 4(‘|‚ªu) entered disabled state [ 2732.763574][T18367] bridge0: port 4(‘|‚ªu) entered blocking state [ 2732.769993][T18367] bridge0: port 4(‘|‚ªu) entered forwarding state [ 2732.777650][T18367] A link change request failed with some changes committed already. Interface ‘|‚ªu may have been left with an inconsistent configuration, please check. [ 2732.879683][T18376] Cannot find del_set index 0 as target 20:27:12 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1d]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:12 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x88010000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2732.974274][T18380] Cannot find del_set index 0 as target [ 2733.123427][T18383] Cannot find del_set index 0 as target 20:27:12 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb800]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:12 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x4a, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2733.207333][T18361] bridge0: port 4(‘|‚ªu) entered disabled state [ 2733.227619][T18367] bridge0: port 4(‘|‚ªu) entered blocking state [ 2733.234075][T18367] bridge0: port 4(‘|‚ªu) entered forwarding state [ 2733.241760][T18367] A link change request failed with some changes committed already. Interface ‘|‚ªu may have been left with an inconsistent configuration, please check. 20:27:12 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000fffff0000000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:12 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x9c000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:12 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) socket(0x1e, 0x4, 0x1) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000040)="3900000013001104680907000000000f0000ff3f04000000170a001700000000040037000a00030014917c82aa75b9a64411f6a4ee1ee438d2", 0x39}], 0x1) 20:27:12 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x58, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:12 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb800]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:13 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:13 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000010000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:13 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x88, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:13 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0xb8000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2734.187007][T18443] bridge0: port 4(‘|‚ªu) entered disabled state [ 2734.214816][T18452] bridge0: port 4(‘|‚ªu) entered blocking state [ 2734.221238][T18452] bridge0: port 4(‘|‚ªu) entered forwarding state 20:27:13 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xec231a00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2734.228945][T18452] A link change request failed with some changes committed already. Interface ‘|‚ªu may have been left with an inconsistent configuration, please check. 20:27:13 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:13 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000020000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:13 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x9c, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2734.545366][T18443] __nla_validate_parse: 33 callbacks suppressed [ 2734.545388][T18443] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. 20:27:13 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xec231a00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2734.753447][T18443] bridge0: port 4(‘|‚ªu) entered disabled state [ 2734.781663][T18484] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:14 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:14 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0xb8010000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:14 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0xb8, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:14 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xec231a00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) r1 = socket(0x1d, 0x2, 0x6) recvmmsg$unix(r1, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_delroute={0x30, 0x19, 0x10, 0x70bd27, 0x25dfdbfd, {0xa, 0x10, 0x80, 0x0, 0x0, 0x1, 0xfe, 0x7, 0x200}, [@RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x21, 0x2, r2}}]}, 0x30}, 0x1, 0x0, 0x0, 0x840}, 0x40045) 20:27:14 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000030000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:14 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1d00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:14 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0xec231a00, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:14 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xec231a00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2735.486284][T18539] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. 20:27:14 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x15a, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2735.526597][T18541] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:14 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:14 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0xffffff7f, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:15 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000040000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:15 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x188, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:15 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:15 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2736.243814][T18583] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2736.302225][T18539] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. 20:27:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000040)="3900000013001104680907000000000f0000ff3f04000000170a001700000000040037000a00030014917c82aa75b9a64411f6a4ee1ee438d2", 0x39}], 0x1) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x24, 0x0, 0x8, 0x600, 0x0, 0x0, {0xa, 0x0, 0x8}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x600}]}, 0x24}, 0x1, 0x0, 0x0, 0xba41224091fe7ff7}, 0x4040894) 20:27:15 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0xffffffff, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:15 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1b8, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:15 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:15 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8800]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:15 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000050000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:16 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2737.017305][T18634] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2737.078684][T18638] set_target_v0_checkentry: 23 callbacks suppressed [ 2737.078739][T18638] Cannot find del_set index 0 as target [ 2737.105219][T18633] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2737.118550][T18641] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. 20:27:16 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1a23ec]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2737.129422][T18641] bridge0: port 4(‘|‚ªu) entered blocking state [ 2737.135911][T18641] bridge0: port 4(‘|‚ªu) entered forwarding state [ 2737.143540][T18641] A link change request failed with some changes committed already. Interface ‘|‚ªu may have been left with an inconsistent configuration, please check. 20:27:16 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x8f, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2737.266321][T18657] Cannot find del_set index 0 as target 20:27:16 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x259, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:16 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000060000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2737.404497][T18660] Cannot find del_set index 0 as target 20:27:16 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x15000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2737.565083][T18634] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2737.747916][T18634] bridge0: port 4(‘|‚ªu) entered disabled state [ 2737.762037][T18641] bridge0: port 4(‘|‚ªu) entered blocking state [ 2737.768454][T18641] bridge0: port 4(‘|‚ªu) entered forwarding state [ 2737.776094][T18641] A link change request failed with some changes committed already. Interface ‘|‚ªu may have been left with an inconsistent configuration, please check. [ 2737.776184][T18679] Cannot find del_set index 0 as target [ 2737.896193][T18684] Cannot find del_set index 0 as target 20:27:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000001340), 0x6e, &(0x7f0000001400)=[{&(0x7f0000000240)=""/121, 0x82}, {&(0x7f00000002c0)}, {&(0x7f0000000340)=""/4096, 0xffffffffffffffc9}, {&(0x7f0000001740)=""/142, 0x8e}], 0x4, &(0x7f0000001440)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18}}, @cred={{0x18}}, @cred={{0x18}}, @cred={{0x18}}, @rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}], 0x94}, 0x101) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001580)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001680)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001640)={&(0x7f00000015c0)=@deltfilter={0x5c, 0x2d, 0x800, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, r2, {0xffe0, 0xe}, {0x6, 0x10}, {0x0, 0x5}}, [@TCA_CHAIN={0x8, 0xb, 0x2}, @TCA_CHAIN={0x8, 0xb, 0x10000}, @TCA_RATE={0x6, 0x5, {0xb, 0x20}}, @filter_kind_options=@f_flow={{0x9}, {0x14, 0x2, [@TCA_FLOW_ADDEND={0x8}, @TCA_FLOW_XOR={0x8, 0x7, 0x2a}]}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x4080) r3 = socket$caif_seqpacket(0x25, 0x5, 0x5) sendmsg(r3, &(0x7f0000004a40)={&(0x7f0000002400)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x1, 0x2, {0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}}}, 0x80, &(0x7f0000003740)=[{&(0x7f0000002480)="8a6fb4d99625b00c0e3d25af845ff2194c4498a99f205c0ff996602278d20170217158e8c36268db97cda4f56c0cc53397aebe646d80a6387ff5e2d24df05f6cbefdebeed72cf86419e94ea89ca1f3a0819f79b732dadd672baccf8edda521a29a", 0x61}, {&(0x7f0000002500)="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", 0x1000}, {&(0x7f0000003500)="774cdcd6b9a12a3db6c90edc9619386f4190f015e0ce46b50960fb6b49121b4f3465093f12132c24dbd84089be4a431eb11e26572fdc81530ad10726835f71b4d6acb5cd8589d0a2523b8cbe97e7f308510104c554f5053f0dc9d0976a5df7ce47c290efe4f742a016808d3d7c3b98dfed87f2562b8a374f1c21807c364066453f1a1da7a7e4bda062c383", 0x8b}, {&(0x7f00000035c0)="0df131905d6ba0f74acc013fe37b7bcdf3b573bb84446243b89656d1ffb05b6b6fd2b803e5f8f0e8c93509e4008338759b2fba01526f169965d844c3b017d5493438688662f5594490a203ddc7597d95fa079a1812feb1ee49e6d591fd7044f605017dc043515077259080d44985b9ca6eb37ab9e7fe", 0x76}, {&(0x7f0000003640)="8dc78b68c4d61244a74d1a53415039ca2c6acc45f91ac523538de1a4794391045d91c9649ce108318b1c18f6963f9b2b269038ade36430598d851c6c77c71a3c4478fdc5efe9436b0d9761590493f81a084c04f42fd9a9c203b9502b20be34163e01f5f2fd3ed56efc2468b82370dceacac97845ef85097a3733cbc40613bb1768f4316e725f592d3e7541638189f0bb6a492b8bfd3eab1f2ac98a89c01e281c14a5bd1cca7e059ed2b5d8972f28ea98f056966319b97cdc14d8184dccb4aed503d540715de8a4ae3d32ce6f70e155972d5dbc5e8ef495acd0d68942dfefdaf97a746c4dcb0aa90395daab5238af2a31ff91e52debf95ad723", 0xf9}], 0x5, &(0x7f0000003780)=[{0x100c, 0x10c, 0x0, "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"}, {0x14, 0x3a, 0x2, "6a11c4a09b1d1e"}, {0xd4, 0x114, 0x9, "f5cd9fab1b4811932800bf6804bee6f15861ee43d6abd6089a65cf4cd1fb163afb0826f2f536a10fcf13dbc36dfca44a43744c5901348cc0d5024c2fd643ca0c986318f962221ac8e495b039a886aa1e5cb2c2f8c754e8dcca4975742e00fc004d4c1972dce67d14067af6c8f266456353f8e7ff4f60001b0e0f96562f123fd954b734a3fd670652a1e0fed1aab78ab45d742da800275850bb3de4f4d18d86b58f8dbe0567b455f3710660d7ceb25ca6452ff53a927cf8b56d73fae8b8dbe61ced626cd9756ce4c9"}, {0x98, 0x1, 0x8001, "4fe430445ef96fb8d17ec67475f49c75dc0ca49a097ede49ac8326f793024f265a4d6365ce1ce118793b549532ccee29bbdec6e5d2d81c5118b7937135e7d6fb2298a7291167262f4aa71b8154a4b732ed6595a34e80b1cff1585c1c5cfeb4d5b9f9bb964553ebbcc7a34f06de5876064fcad8353b7c4d520b1fd11f34754c7da6531bc86e4129bbc2"}, {0x6c, 0x0, 0x3, "358c299d05fad7e43fd4ef63c6b30a5925eb4dc1fd5571a309ef5dd4bf6c22bcda01c8d3a50cdbd6a6b30ff6de408a9dd9540190fc4020d5f0412d96b2a68d716f356f44b31e75fe65eea973a61bd93243485865b4e0f103d06b52fe38df"}, {0x3c, 0x108, 0x6, "c4efd3003579f8b034a47c8ff38f49aaf8b82215bbb754ea5cdd519b29f3dddc9af313c4fada45d5af4b4a7c6817"}, {0x84, 0x110, 0x8000, "1c5f1e4a0ec0cec6771942741c94bd028a40f2517aa5ece218c28cff915bee164ed18135ae913202aa76000e2ec5435946196055bbda655a190aa533bf20d9e4073b1903cf0e60cb7ef394255d445aa51f708e0d55e7c7ecd32167c5b8e643c82da92e79a96d6707cff71ce454cbf99b5b766e001112e048"}], 0x12b8}, 0x40d0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syncfs(r4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000200)) sendto$unix(r4, &(0x7f0000000300)="7d9adc7c55d779bf477cc87edbb8c8f7ecd18b4fb9af61a614eb71ee5d1f647bf16c7f489ea73911253d6a72403da3", 0x2f, 0x4000004, &(0x7f00000016c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)=@delqdisc={0xe0, 0x25, 0x100, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0xa, 0x5}, {0x6, 0x10}, {0xe, 0xd}}, [@qdisc_kind_options=@q_pie={{0x8}, {0xc, 0x2, [@TCA_PIE_LIMIT={0x8, 0x2, 0xae}]}}, @TCA_STAB={0x98, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0xb8, 0x6, 0x6, 0xdf27, 0x1, 0xffffffff, 0x3f, 0xa}}, {0x18, 0x2, [0xfeff, 0x3f, 0x6, 0x5, 0x3, 0xa9b, 0x8, 0xb18c, 0x5, 0x6]}}, {{0x1c, 0x1, {0x2, 0xfd, 0x6, 0x6, 0x2, 0x9, 0x1, 0x7}}, {0x12, 0x2, [0x4, 0x5, 0x0, 0x1000, 0x3, 0x3ff, 0x5]}}, {{0x1c, 0x1, {0x40, 0x5d, 0x6, 0xffff, 0x1, 0x8, 0x5, 0x7}}, {0x12, 0x2, [0x5, 0x6, 0x8000, 0x1000, 0x3f0, 0x4, 0x1]}}]}, @TCA_RATE={0x6, 0x5, {0x9, 0xcd}}, @TCA_RATE={0x6, 0x5, {0x2, 0x1}}]}, 0xe0}}, 0x4000) writev(r0, &(0x7f0000000240), 0x0) 20:27:17 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:17 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1b8]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:17 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x90, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:17 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x26e, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:17 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000070000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:17 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x300, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:17 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2738.361816][T18702] Cannot find del_set index 0 as target 20:27:17 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:17 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9c]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:17 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000080000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2738.744873][T18725] Cannot find del_set index 0 as target 20:27:17 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x30c, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2738.845315][T18727] Cannot find del_set index 0 as target [ 2738.985421][T18728] Cannot find del_set index 0 as target [ 2739.067538][T18749] Cannot find del_set index 0 as target 20:27:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000040)="3900000013001104680907000000000f0000ff3f04000000170a001700000000040037000a00030014917c82aa75b9a64411f6a4ee1ee438d2", 0x39}], 0x1) 20:27:19 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:19 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x2, {0xa}}, {0x24}}}}, 0x278) 20:27:19 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9c]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:19 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000090000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:19 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x700, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2740.111941][T18770] __nla_validate_parse: 6 callbacks suppressed [ 2740.111962][T18770] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:19 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0xc03, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:19 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x3, {0xa}}, {0x24}}}}, 0x278) 20:27:19 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:19 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9c]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2740.471315][T18807] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. 20:27:19 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a0104000000000000000b0000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2740.604556][T18807] bridge0: port 4(‘|‚ªu) entered disabled state 20:27:19 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1100, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2740.679713][T18808] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2740.690420][T18808] bridge0: port 4(‘|‚ªu) entered blocking state [ 2740.696914][T18808] bridge0: port 4(‘|‚ªu) entered forwarding state [ 2740.704692][T18808] A link change request failed with some changes committed already. Interface ‘|‚ªu may have been left with an inconsistent configuration, please check. [ 2740.891740][T18837] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2741.162330][T18807] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2741.312787][T18807] bridge0: port 4(‘|‚ªu) entered disabled state [ 2741.332576][T18808] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2741.344220][T18808] bridge0: port 4(‘|‚ªu) entered blocking state [ 2741.350622][T18808] bridge0: port 4(‘|‚ªu) entered forwarding state [ 2741.358198][T18808] A link change request failed with some changes committed already. Interface ‘|‚ªu may have been left with an inconsistent configuration, please check. 20:27:20 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:20 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x4, {0xa}}, {0x24}}}}, 0x278) 20:27:20 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:20 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a0104000000000000000c0000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:20 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1500, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc"], 0x230}}, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000140)=""/199, 0xc7}, {&(0x7f0000000240)=""/222, 0xde}], 0x2, 0x3, 0xfffffffe) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000040)="3900000013001104680907000000000f0000ff3f04000000170a001700000000040037000a00030014917c82aa75b9a64411f6a4ee1ee438d2", 0x39}], 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a30000000000800054000000002ac01118008000100636d7000a00102800800024000000001080001400000000e08000140cd7813e70800024000000001300003802c00028008000180fffffffc0900020073797a320000000008000180fffffffb0900020073797a310000000008000240000000dc"], 0x230}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xdc, 0x4, 0x8, 0x401, 0x0, 0x0, {0x7, 0x0, 0x7}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x100}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x98c}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}, @CTA_TIMEOUT_DATA={0x54, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x18000000}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8c9}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7fffffff}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x80000000}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x2e}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x3ff}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x5a4}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x600000}]}, @CTA_TIMEOUT_L4PROTO={0x5}]}, 0xdc}, 0x1, 0x0, 0x0, 0x4040000}, 0x8010) 20:27:20 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:21 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x7, {0xa}}, {0x24}}}}, 0x278) [ 2741.885405][T18860] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:21 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:21 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1c00, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2742.014533][T18874] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. 20:27:21 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2742.195676][T18879] netlink: 324 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2742.223686][T18874] bridge0: port 4(‘|‚ªu) entered disabled state [ 2742.254953][T18877] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2742.266349][T18877] bridge0: port 4(‘|‚ªu) entered blocking state [ 2742.272837][T18877] bridge0: port 4(‘|‚ªu) entered forwarding state [ 2742.280316][T18877] A link change request failed with some changes committed already. Interface ‘|‚ªu may have been left with an inconsistent configuration, please check. 20:27:21 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a0104000000000000000e0000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:21 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1d000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2742.435622][T18888] set_target_v0_checkentry: 15 callbacks suppressed [ 2742.435688][T18888] Cannot find del_set index 0 as target [ 2742.466063][T18894] Cannot find del_set index 0 as target 20:27:21 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x8, {0xa}}, {0x24}}}}, 0x278) [ 2742.630819][T18905] Cannot find del_set index 0 as target 20:27:21 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1d00, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:21 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x88010000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:22 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2742.842277][T18874] bridge0: port 4(‘|‚ªu) entered disabled state [ 2742.852609][T18879] bridge0: port 4(‘|‚ªu) entered blocking state [ 2742.859026][T18879] bridge0: port 4(‘|‚ªu) entered forwarding state [ 2742.866489][T18879] A link change request failed with some changes committed already. Interface ‘|‚ªu may have been left with an inconsistent configuration, please check. [ 2743.044114][T18922] Cannot find del_set index 0 as target [ 2743.148583][T18929] Cannot find del_set index 0 as target [ 2743.162894][T18938] Cannot find del_set index 0 as target [ 2743.194106][T18940] Cannot find del_set index 0 as target 20:27:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000040)="3f00000013001104680907000002000f0000ff3f04000000170a001700000000040037000a00030014917c82aa75b9a64411f6a4ee1eba38d2", 0x39}], 0x1) 20:27:22 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a0104000000000000000f0000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:22 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x11, {0xa}}, {0x24}}}}, 0x278) 20:27:22 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1f00, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:22 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:22 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x88010000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2743.656312][T18961] Cannot find del_set index 0 as target [ 2743.660671][T18960] Cannot find del_set index 0 as target 20:27:22 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xec231a00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:22 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x15, {0xa}}, {0x24}}}}, 0x278) 20:27:23 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x88010000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:23 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000120000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:23 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x2000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2743.880676][T18991] Cannot find del_set index 0 as target [ 2743.910360][T18982] bridge0: port 4(‘|‚ªu) entered disabled state 20:27:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) r1 = openat$zero(0xffffff9c, &(0x7f00000002c0), 0x80240, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0186416, &(0x7f0000000300)={0x3, 0x9, 0x2, 0x3, 0x14, 0x80000000}) statx(r1, &(0x7f0000000340)='./file0\x00', 0x100, 0x84, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r2, 0xee00) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000040)="3900000013001104680907000000000f0000ff3f04000000170a001700000000040037000a00030014917c82aa75b9a64411f6a4ee1ee438d2", 0x39}], 0x1) r3 = openat$mice(0xffffff9c, &(0x7f0000000080), 0x102181) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xf0, 0x1, 0x8, 0x3, 0x0, 0x0, {0x3, 0x0, 0x1}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x100}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xce2}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3ff}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_DATA={0x4c, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_SCTP_COOKIE_ECHOED={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_SCTP_SHUTDOWN_ACK_SENT={0x8, 0x7, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_SCTP_COOKIE_ECHOED={0x8, 0x3, 0x1, 0x0, 0x20}, @CTA_TIMEOUT_SCTP_SHUTDOWN_RECD={0x8, 0x6, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_SCTP_COOKIE_WAIT={0x8, 0x2, 0x1, 0x0, 0x7fffffff}, @CTA_TIMEOUT_SCTP_SHUTDOWN_SENT={0x8, 0x5, 0x1, 0x0, 0x2f7a}, @CTA_TIMEOUT_SCTP_COOKIE_ECHOED={0x8, 0x3, 0x1, 0x0, 0x7fff}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0xac2}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x16a}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x9200}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x8040) 20:27:23 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x1c, {0xa}}, {0x24}}}}, 0x278) 20:27:23 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:23 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x7]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:23 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x4000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:23 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x1d, {0xa}}, {0x24}}}}, 0x278) 20:27:23 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000140000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:23 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x1c00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100), 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) recvmmsg$unix(r2, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$packet(r2, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) r4 = openat2(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x500, 0x0, 0x2}, 0x18) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000440)=@req={0x4, 0x1ff, 0x43f7, 0x7}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)={r0}) getsockname$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="54000000100000257749ca6e000000000000000000", @ANYRES32=r3, @ANYBLOB="040025050a000200aaaaaaaaaabb00000a000100aaaaaaaaaa3e00000800090005000000080007000100000006000500040000000800040006000000"], 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40000) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, 0x0, 0x200, 0x70bd26, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r1}, @val={0xc, 0x99, {0x0, 0x6e}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x36}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x48}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000040)="3900000013001104680907000000000f0000ff3f04000000170a001700000000040037000a00030014917c82aa75b9a64411f6a4ee1ee438d2", 0x39}], 0x1) 20:27:23 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x4a00, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:24 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x4a, {0xa}}, {0x24}}}}, 0x278) 20:27:24 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:24 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000160000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) [ 2745.098061][T19071] bridge0: port 4(‘|‚ªu) entered blocking state [ 2745.104539][T19071] bridge0: port 4(‘|‚ªu) entered forwarding state [ 2745.112339][T19071] A link change request failed with some changes committed already. Interface ‘|‚ªu may have been left with an inconsistent configuration, please check. 20:27:24 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x1c00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:24 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x5800, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:24 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x58, {0xa}}, {0x24}}}}, 0x278) 20:27:24 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [], 0x2}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2745.481504][T19098] __nla_validate_parse: 11 callbacks suppressed [ 2745.481527][T19098] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:24 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x5902, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:24 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [], 0x3}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:24 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x88, {0xa}}, {0x24}}}}, 0x278) [ 2745.903902][T19071] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. 20:27:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000040)="3900000013001104680907000000000f0000ff3f04000000170a001700000000040037000a00030014917c82aa75b9a64411f6a4ee1ee438d2", 0x39}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x4000000, 0x0) read$ptp(r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syncfs(r2) preadv(r1, 0x0, 0x0, 0x9, 0x1f) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) r4 = openat$btrfs_control(0xffffff9c, &(0x7f00000000c0), 0xa800, 0x0) r5 = gettid() recvmsg$unix(r1, &(0x7f0000000900)={&(0x7f0000000700), 0x6e, &(0x7f0000000800)=[{&(0x7f0000000780)=""/94, 0x5e}], 0x1, &(0x7f0000000840)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18}}, @cred={{0x18}}, @rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xac}, 0x2020) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000c00)={0x0, 0x0, 0x0}, &(0x7f0000000c40)=0xc) syz_fuse_handle_req(r4, &(0x7f0000001340)="6df9f09339ebe9d9c55f92f9d9fd36d4766f591d0553a1d659e7b417936523f32f742d78983cfb25d42ce81e34849bd6c5d68e21399d4aaaa43ff41cdfbb73bd647239320a09a6c499e4f1c8d08659fa19e400ec973a1634d8b5ba2b9903ee54be36d8d962520e6f06c409b000fe867682d20e1c4f8a0adad63918f574324054c0003938b7c52a08c2eb23af1c845c66ec692e0913234bd53f8d08aa1022b4b176a0f1215b4a92b22ee6ecb36fe2e170a15e6fdd291d82a90e342299b67ceda1e680123d95e5d19c04072708c7dd4e9287b22d7216e082a26cfa5c11120b70eff51a6eb0c0deaf082fb0fe29fa189ba59ecd68a80d6a023b2c7119ab74e2fc550ceb4b51e2fd4f61132189ecf9bf6b74e69967dfa8279f808ce507259a95521ddf02c8bd302d4d338f549c2c61ea0e0a035bd76ff831423a1e04e72e9552a16ecf2f282f886f01d594274bca2ae21f8359d9584436093c99a94a46f2cb8994ae85789d4f9c16f7374e5c3f4aa3a5f704fc71132ec508a27d280e60bc54162c16df22ae75a4d610d664f37edab5e684de9ede160d2aba9e526a663d422509afec58f39dabbda32cfc1c9afac42f17e6fcf70548c813551650834fac7ae6d7e775cf5ed18a414ac96489b366629c6cdadef33d785c5f196e5d19f704c503bb2996a4cd88facede946cf1f395f8a244e379d89ee6c4feb25c328adf05ad723c957779ee330b3784e0c43f3d4d3cb91cc1dfa54f9574602792c6cefaef606e50ca7be029ac2f0ef1f49eca14b34b5a554f8975f67379f3bd80e357ead41afcb2606ba28f64f70e8890cc59f962ab55fd1e55877daa2b60619f06b8ff793885a75f8c7c4a6d922f1fe202f93b4420f0025e0a1dde95a2a33dec511e0273d3b0c79826782aeaac6bc12d76aa112d9440f0edf2ec6e44e812ef80b41658105d9629a3e851d7102116d07f38375b2f0ec97e04c8d159df35e5d4d704b2d6c593c81e6ba433cfdeab1b21c51d158cffad796c4e6a47dd7a20154b259f9ea2a8db95dcc19adf2c762f228a2230483ca7204a602116ffd2d69c1d1ab4d3fafa9da61a56f6591ac9c0420f90648a187692758f53ad36d5e8cc5c28ba2deff862d703b9a7bea85fb78c2b5931c397cdf502b63ebde2512e0e9bc310909361982726c556ca4544a3e4a63357a2c5af945614cf329858fe390a37726110c3bd3e73a5d68d52522b40d2ce8d28b0c2b22742ec73f8f01b4626e42a15bacf9f6fe80060deb542203e0de59cc6d0f1707ba6bb2ed5bebed19c825099e2deaefb4b7a9140c3e7e25ebc21159dcc5714c414dc62233a40b5acfdc1aa1b472b536a28827d4efa975d2c89416fa87b4cdd0b2561f2206939bf22681647fea4b3bd9eee2c764854c3a6832e8cf6531ff6252289931d7c5dc119bb5f78f53aa0eac1dd8c97857fcc2af94c79099d7d943f4917d06ef5becdbd0153ed5f6391d39725e1e8dac5f1794d77c87c95a7730da6f11fb7a25fc573709386b1e5d714eb45c88fdd8fd1ba06716853861eb6096aa1a5fd85542e20c80a3a441de38aa9a5e6b4d54f8e9a03860bc70fd1ed6c156ff641d403fa8caf5ff34f31f87ad6462eb5bb7691ac17a25ac3c26cfc6fd2143806ae6d6a839b4cbb3404cb9635805f8f8351d5c7657bd52b871e2a732be647a76b6e7a5545dd3d96c10637e539cc40fe2ef61a7c13559ba8e29f4228472f3c4b660e556463c79d3efdf6684a68d7124cb9382e2927d5c5d130d2e69a9300f36965e03349ff5a0b8944b198709cd1de660e77da38e1a37b138664020d37891751716af914e8c694484a2ec21ed2e9d36268164ec9a7338986eb29a687bd3e0eadf45d43f774da726be69be1105a0fc78958cc90bd5a4b3b5a50312d65de5c07377567f8d71a36f20466937e5258f55326855679f77ff2d43b1f00945fe6a3ccb8354a3feec6210f93dab9fee5b9b9c83e2a2430cd66d18f6806b1f790b00602a06079524486afcde118a6139a0a0b9524c89a0f0691a960a2867a496f7adbb4b6314900691d7a4a07c3df1d637e6358a9b82e2bb9c8eab3cae8143178b8075a69aff1a942be00c99399fde5680d7144f71a067d3d64c4a653811e357530049de33d29b4d4e456aa848f016f68eb2ce3d117612caedb401ef36ba26dba853a9e357ad38cb69b05debbc83361c3b753d042a5dc937c9136c12ca677b8038d7b651f3f733bafbcc79cc2450e92bccebce2c16a934c706dbd2e361269c96e07ad2fbeae7a5524dbd7a8fc730c91a65b19fcf2f952f3905d9a021cfeb30d88efd68992709c27e7ec3dbf923c73eef3c2787664de163219b3b89a5c0aa335938c2dc66f2f49dcd32d2b4500fb8c63dd68c4f24768ef57e11540b53f4a6b2d3251147637cac51f6435b1726addcb972cf923819a6b07998f03210156cfd3b10ad094d34feb8d3226457849a71a190cab4ffe360f2426825659615a8c5506fa543b21aa4aa5887001d9b180db574cb46af68f94213412f11a4fb98232a2ba759a4e32d34e4092b6728b18d6dff9a388a686c639cc2c954fa00c36adc15a0b5ca9f2f49e3750fb40f7442f74be220ec221db9fc81e576e9d63848199cc952ba925bcc12548a29ddc4cca794772e7aada663fe5133d3589b337c756ea2f617519c82f726a6e5cf266dc56f1e24c4ac0d1e071c339f1a9be66ce1b75c4abbce2faab31d1256ac1210da7f3262480f8ecb48fa353b61f3bc007361e6885963129f241396ffb68af61c7711707451cd3c8be8528a53afb8e44bd9e5609ec916b712b7ed0c5dbb6e5aaf55fb013b5db0fceb86bc499d2fd731c5b98f8d5e0505811aabcb2519f9689776a08052743733369a10460d14673e4b58f02ab39530755a1bc2e46aa46c56a357c0f949ac14512c01ef3fea7dc8c7d6c4b7f5c3fe3bef42a1b40aee030e9bed5d70ea0d5c947be3f74691b37ebb93dce38a5bcea82f6dd5784f225788205480b4381ba2f0628ce049394519f933da9cf4bb88ce86cb315556460a1de1b8d10c1404f3ca611b362c339d01b00b5104af06ff812171d89c403c35f5cd7e27965e56e2296b8380aba4e9ec86714938ffe0e917b65225d36eac25abb3dd212659a91e4e20ec765f9a2c2cf4d5b3661f4bba3f2240b192443cfe051ae5cb137ab97b52caadc169c28055965eef64629b9cd18c3a9184a6fc07e456144988b08014650ef89c43dd5dcdcbbef1281a4990886e0588049bb678dde609cf219d60911390419c4b31da431d2eccdb651c745b1cc03c47f3095f09119c3caef87d1f6c719af9290f8a6e6fdd800d56a3fe4f0550f402b3070fb621e4db894af8ac5819042adcf11563cc5d94391c27a82b99ab7183925923b3c62a8e3439fe2c725edd3cf6042d6d062c865569efbeb26daaa482260614c85ea676cbebe6d2cc4ba37060b8be7b32787d6409886249eff24f53ae70248f3a42f84cd3563745a8a8d5c362dda5a5cf4ad9545e1c4289aa1501048ee4ec8ac38f8f6c76fbb8bffc0c6a4bee7227f4816ee666f03a0c1c37195a3e06afe83471fa1c1580bff0497bf1cb1ebdbdac0b7cf3dcb68ac32d405984eaa44c24d860df24ad40606cffd28827d0d486a4d5170888fd83a569de6c49753d19855f6a26fcea0af0fa3fe6a9d7b2d7d2a5bc2637592e670005fd12e8f885acf6ae375488b66d9f63e0f83bd88bcdf7b79cc7a493158b36e9588eebdf581d1396646d1af7b4baa441b7affc00825c87f04ec9548ba2dfc82746902369d89a3b26a401be09e15b421bc9072dea9cc57c3691dfa6f02224f3226ac32288863b07474d44430a39ea97db3981c784a17812a3d462a840322aa5853d2c9f7c6fa1eca05067893e6446160aa9a4525ca78bdde200a2e9d05534aab598ba98ca7ff75d6efae571a916034772a72c7001d9a530e09c5d9201a0058ab7ba7a9c86cab53acaff96c5625da2d73b52a06ed11d7abb345d6a63095d4574376c9d51c585fe472c8ec5c725d89acd2a71ba84b4275cfff694d81a17f856ac9b56808ec61e4a5e64a421f6b7cc002a6ee45c016c61a915c15bad2fe0dc93bb5d3fafe963f2c55e7015a25fa92edc0414df524e1d6cb8be2726b5f966398efdb160748b512cf6a7a4c08b114794f1d8d9b3834f1be6f806acc1ad2acd845fcb1fabd66dd1e8ebcacd3a9492bdffd846d7fdf41e2b34ee541b622a45686e06483c0455a96fa03b13943776cbdbf3f85533b9671abbfece7f29a66484f63490dc7b74896314ba5230501816c7b23efbab76918f8d55162367be17a960a421936740fb09666ff418f8ef60c0eccc5498526e1df1b0453f90789d98a54c84bd36f72557a52a18f62e8f3a1939f52698dcb1fb33255d5dc1e03a359ea6ba4894cf01bd648dc6bbdd719b06a68d1c9c12047c2d4b56da0ab7e9591c12502d73bb98b6a522119c6ae15c5d61e6341e0f0579d41bca2f82718bc3a9e514fac958321c5fa98eadbe8792a9d2337680dce640348ff7f1572e6313f4d94d60e6b26a75fc01ded6d67c379193eea4e41635e12b13b3ac07d7bee99fd0936784df27b83936b19f66e9c366384874c8788d11fa131247ffdc00563bbc383b625d8bf26ebbcc2f9bc3ecd0f35629e5232b546e765186ac95729273ffda2698c23fbf06e9d7221e1639c40813901d6aa5025aa3aa9eb96ea0d2c29e07d816ccdd4219011ef70a1d8f8aad7e1fe72c40d8f521d3a0dac331a0d9a9f1d194c4009fdd030a4a5b33924aa5cbefcd552f4f252b005fd04bdc31a8e9e48f90511e622754389ebc919cbc36a7e7dda4bfe2a448b2e7b28b1682d4195590f2b9e59c80aacc493d6b4489b130b92bf5186fd2e028aaec2091f2ff46d1640361e5d492a0770b9098d54cfcdfe688801d4cad72698d7f679e8e7aa06af62ae832edd0a7554a5203f70274d670f35bf13ba1befe50b909e48846944d5b80f1a507302ee66f9b7e61e35b8910d3b8746751732253dd0bed6ed3976084a5e32f02f8c7eb5cd6a6d05621e2c61c96486bd0746cdb94f3c356d26d06b21e0a1c0a57ef3cf1f428ccdf47b311b0d6e572f67c324e42fbaaf4440df505174c3dd6e6a5696cde6645e73d7a281831a73eb62a3cbebc23c52418a694b5394606ba33da3320f5e0bced66ce8bb47163b32d3cb2504473b949fdd2e84104e354e3faca28582d1d4538804cedff7c7fb21db82bbe8fa9e8d864d6a9d4b17fc647f674e4660679c6f8aa088edf6524b550f4bcbb5f3acf3f676f9946f4283cbad9b92a1b3d528ac535f68e8bed9cdb4a1731558d07c743243a2e093b8e7002fc8c48f23b12de72c77558d375b3c33cba62e3e6ea3eb02ca9e9f129e62c5b5823901918c50fa2ca75680ba13de2afd9599362637cb99b4a8a5bda01babd06374d0689c8ae202aba043d7efc88a28e8aa63d63bd6105ddbe278576cc9149e131d623f8d6c1734ca7ee868e5df870467ca0d136e801b3b798bf96c399714b9be0899eee4ca148ae3c98e2bc9753d7bd8e9c6b642cf3f7e246c1135b61efb17236533ad253ffff50682c8a76274febf95ffbed72738577967814498611757eb1a05732f3be81d5b0513ebce8f4a3acef0bcb09da412ab055d3cee647cf339f3f45709192ada69feecb104dc996fd7f82e4de4795efc2031b073ab7da4f4163a027f1dcfb4aab2e0a8128c0cad8d574cbdb57763d89bb5707e6d2aa65818e51d4652fb9b9c55afd9096014c8a782586c520a5106fff91451cff77e7d18910a5812e53f9fe589e54fc891b31a12453cea408ac23778d14af5bcc69029e28066d2ad52ee388f4bf061d1ded1de5023b032d4cbae6f7b15b28d4cfda42538a3b6753dddd25871a1714ac7f841c6d6a69c76d8eb6a62536b871cd0b082dd67ffe2644b430ba6580274bd72f38c53c1831277483e73a10455a6c21aebb18357a6b5dd0fe77482b495a2ae0f3468a9f7d4effa6c9e20e61a9e8be946c7503d1019b48622841d1c40e2b5de15bc48bc3be9dcf53b0b933bedf6ff6d452846a4b9c7f3e846639c24260081a20284c7338273d40e01fea0f8527093ac7e3698d9764ad86f492235dfb21efc1d0deef7cb2e450f37699b62466651485bccffd70d5d16c5dc3700a5e4a8b2cf3cfe2257e765d66bd70db45855f8b6065a810b3494adca2c3d1a094f515b29ff3122331b1e603ebc999d53802da73236f32c6f7de37db3e966b50dcc3ffccc0fdf34a37d5f3917ceb40ad714f9903c3b25f36cb6e1e2827600eaa85406ed356d33bc148872a5f127cb0fae1a477c68604fa0ea4af81dd6222594ab7e000e1c8a714102539762dfaa1ca71dfae302d0d01c3a09a1a1400b8ead02068d04b12f286eb2d4f21ab24e958c6fe83a5feb7f60d94a26f1ffdb3700ff5a6eb8b97aedec06ef0ed0a818b88789e7053ac35c7d7ae824471d284bd95eee14742ddce16fcb98c06a052724b019c82bf9bfd9f25e24595afb5374be6839038f72b58c21cf4f350dd1db707d340ff32a1c7904e0c8e37fb0aaa0fbdb7c106d572a840c00aa96af6c0e18e1210516eaf3926c28ed119a7d9f4cda7337455c02ec98ee1c83560c3f5340382566d6203c700714cb38101edfd7b32096f0436fe0994a77fa83768b03b7a787c8261f6cb78bace0ccd8372a29f94d3d6bf20bc4d41dfde7a9926dca312e71c99b1cce09f6f1431afa15c1a9d66fe6278b3a1954e8fa7a756c84741a98147bcf7748dd8167996d68e070384bf91f35b15a1995b2e0d07b8e92625f3dd2cdd67ab382edae483ece10bd0e21b006f1a191274fcd9697705c87ee59ff2b8a1d8cf014fd3ad4cb8d345b487a6d59125f11a71541d9373b4d491600bba73c3916a2b88e5d9a5e740e23aea383213d955d53769538701c5656c6409f05616be60378de226eaf8a126bf823d67d935715e504e88e2cfa745f0c28711f47e92fa76c971809b9467dc59e4edf546ecbb1d83e2b4e953c2bb2573d16ebbc7d084d1d012e9a856d5c1b7d95f19f6fb08ad00d0fec3b3492535c87c0dbfe3cf5d8694d5d156b9ea9aea461289e2b8edcc860f7a1ac55464f0534bf03be8217c625a1dd79ec4561a209cd5ebf0e7405a9bf990e05ca5cb2f9bfde6c0fed735615dd6c080da8a7574c4060c18feac20bfbc2afdebc17ce9889a51342f3bcce1fd99893f2084538f406f9ea3db46a408abf291b6593be2e301f8be8d6d11a390c77a2dc0ce7522b5a63d665a72387a9017f1c81865f08a193c55d9ab8e3c6dc28906f272ca32efc8f4ebffa045b908a9d1d7f4a8f2d21a029fccd9e9f8699d40446492b177fea2c0c3f45c3a059cc01637d6b4389a3bf0bd671f3490c3854db0024bd01beaa1a9ccbca4b1fdc74b61acb856187fec7a12a76027eca73a819fe9f1a47393c1b27ce5d3aa93d4f192d03eb4e9055089a3889a2e305b190fa16bbaee5e808b437dad1bb1c6f42a5c6188abb27e40478909a8336a512e967a83608f77c34c350b68c9383d166776919f0b94c8d400765554b139a6210157ebf76945578c6f4dd4f85b3ea66939b05850eb7e4e0826f02d830d1730d5be1e4b82ad7c5fedac22fe16336760ea1f281433afba945c39bfb4198ac44ef16b73622b21a0b60bdee4e5dd9bb248073a6d886f384ea4a407519ce35554b5de4566a61e37fe39c490a681c1d359d64d0992cd3e1e14e719f5b8b2827006ee6768010e96fccbd0bb9a4592c5b4e6971cf685730e6f75e2261535f1221b0d43ce7a175a3b456202df1478b76a6c499258d90356bcbef7c33715c1e4103b5fa58ae084a788b4c4ad57d38c29fb24142e860cb4fdfd96b297a97c147df866f0de7cec77fbbb2d408c3750206a62b20f093c18f7f5948a6b9824c42d23df2c125d62eee3745182daf24f68d657bc1e9bc4907723d1deb05711ed8bd9689a4cc02f09b529fc308267d0a8160e9ee1e91737cdbb9a1f32c30808598e8c7fa3e153035ec0d026fb7901086b1cba9a3e9f0f98550d84620e5bd16ce109bab662b7145c994b69a9555125d83dd327d5e062a5c4447210bd5a26e3e0db7af9d264a4e55294ca76b470cee58f14dac42dd538164454c1da49892714cd98c3f0461cdef13c70b884b1e0c0f87cd4a8df78d0eb0fe9436ecfd062d5174a0778074ac17d0c066c42c16cf40d035c55e88db096e10f4401c4f621679efcab51807dc82ab88b336326d03a3bada8fe77b556c617b523a5806ab3b36d67e5a694b73caa7d0a1226f5d34379857e7c100bb895efa0b4ffbce147e076548037b407aff279d0464ccc1fa986c54d899eb59268cf5705a60e972334019b74dc44d620ff9f18372553786664362d7fc24acb548e99e548dc1e696ac5627f328041e508e1721f4b783520a9acf97bdb53a35dcc3edeb311a16d8d865993ca94c3af3e0f2df0bad2f7937b7262cda35ac676d18d0e690005dc05cf61cceeaa642b6331c8d49eddb8a98717bfc824057b39ed20ac8db9ddd1df270876de40f3fa2f759c843635c2ce35a0de3eba14de18611edbeaae09d92e1b5349000f1fff8b08f41d520e9b1030addf66bc12d38d2e337fa835a723337d014fa829e899dea9a19fdf03bda688d12508e21fa7c4ef08df6ab4bb0d7e9706b69c7b0ff92a00387d31b325cdacb62af06a8aad75ff693b293d9f9783c9edade474d2d8c4a7746bf0214821b6d6c7be06847b839b2fccc8c5588c26415a01da463e8f816e59caa7eb5a6f8f71b269015b3981484e49b3f20d82815def392e3de73cd5a7cd7ec82c326580e995a7790fd1c07732b055c44cfca457441dbce293fa3f61371c72007662cec050197e1ce168df649041f3da236523de4e736edd7cb841dc25343a22514c96ce2a57341c84f62bc043e07796552007a36fac0c262563f9e5505f776f04fc41ea56d4806e7e037de81386c380ce609808f8163c705846e22428965c5cb432f1087c35ed40127e3db050beaa8a9fa22e6477e3268763e11e4c50df7827c42019623cc258300402cd08cdc1661e0d3bd9979bb38e33972a446c4f93a7570827c48f10054be4963917d7f9b90ee32214fea90d887cfe7cd1ac04d6375e8d34ae7bed3362fbd70bec7d2452d4d7df3923fb56182551531e01082ac928c49e3439c18a31406919647ab34c7f2e82bc51cae7f7e9b8ecbd2f0e78f3ab444bda9091d2c546e335f407f762a5c56d39f1c2b12e134eea0ec6f90fc24a29f2b1266a655a3cbfb082aa45b1e8eb891ea0057604aa530d091a45bdf283a219d7ab1c59f46e16d15056ef2dc8ef7c581df2c2357bcddee8cfe4964a83c2dfb4f23127ac21a250dd96f3f519df6e91fc5c9bc796a1539d862603cf1f3976b49e91a294ba054ea29aada5e4bd04bf4d0665bd8088d2fbf410369b765b575bdd17ddc0f126f1493ba636c3bed16691007f1310c59a77dffa364338c8f5e5d141b09387b894b1e40256a4015e1375c3bbacab26575caf6326fab1f9f29da8677d1d8cd5005c7ad72123b4db7c43788ba5a0b881ffc771c9591e0b3e070dd94d8c1126a2febc730309bec070aab3a389fc9edb0104aff91df916a0e5003a3686f4041f27d1ed1d20bd94f153101222811a8873a6a333ecf6a81bf8eeb091728780a907e6dc37db8593f8a4821a278e79b6627fabf808fe5ba2348e42fad96d2a2688ca2e6924f44c1df866dcd5ff19e86321a8dc549ccfffe0d43c6460ad5bbb83c6267efd142d6f8df4ca3298c53b09ba95163807c4c1b8be5ea6d3db58a6fa0f9c7dd4b27cdacd52d890a51989c94f6f53db5e8f51bf0a4141d2b72c05c39ac996db7fd5088b804c3013835b47339621f05b2e276ab3265be57d3b753f31c2249b24c2ea777611aff942e20e055ab1253e83aad23c361272e4a1f862a697e4db39481f9a278c00e95e69efd43025a147352009c503ab2c00923bceed8c6fb86023ed6845b31bd6516c0277f0fcb75ad9c8ebfe60f5d87348d2f65471112a4d5a435d11eaecf57727e87502433b44cf06bf3bb438972fd37f4ce551a1289072250aae4a4c89dbc392957a824af23c02ef83b2cbe12a53179b07f72dc5e5c1540255d2cf46c9e6fcafa156e6ba22964734a2763bf4f1ce806c970f1ff08b48ed13923022820c22e88a1ea585f1943823522d8f400a2e4ab9b612cd26ff9d5ca8f46184f2fab0f41fd7d845c7c0fb6465971622a306765c19066233d29284bde824c3a2ffd83ca965c1099b61e879fe7ed89a48a55bcd737a21e694c94d655137c8f30f74c1d38561b8a9b860d9d9479853ee5a0daa01f776372c8732e5ba116761eacce89e76f7ad72b49389d263502b550b4a44c4e52642d10356050599542478669dec5aebdd09a70dae72a7f9acdfee12d55cd95ca64e8523168c001c88d0e02d522a70bbaa39824fcd801544a28d00f00bb2ea35a7d4ea337a8acc817920070ebb94a90e4b00bc9c5b074fe866dbec760c860333b08f18988017783caa16e03c894273d0876279111929377f050f4f833e382b8057d51d1851a06f5ebe5eac2c4bf8750e6a68a22cef93160975bfcaad3de98fcaa0e4e4143cb6752cb6e83bcd951fb733e5ea1dd0a4cc97dd8e787d3afbaab499f557b467dd66ba9f73fe0b466efb22268ad642b29bae4306a4b08b94518ed680ddc6a39b50d466ad74012f2f5e3f16358233b64abfd27a19503367bd08f44351ad5392ffe008c9143574b689ce34cc3af6c64c23f5540a605a8962fc01702880fe4fee48f611193fde881936226f74555d9f9cff12facc25cdc0161027273e2bd7bacbbe0ebb0c74fd02b0fe584175f61c0930ecbb6b7773ec42e8e2fd2c9a818183e3a2e0cc286a35c11f4997e772f8aae8779daad352ccfba0c62bf0c1e9a3a406bf5e62ba41d7f12a09fddd8ab20753ea6a979a9c929b61ade26ee83d12c825f560a94ab588e76d8805ad7c84a366c750964b0af6d90b63eb8ab1f98a1185b452712ce09557d0baa20abd6d8db6d7827f6659fddf0af2b2d62b9a9679297ce040e91fe98b4b9fafa91210874c4fdaa0b5aef96321cfcb030b2751c264b5625e98a5ea2d526727f185071abcd130fcb76e5d3e51d882b7830e0f0f3f1a024fb518bcd0ed32c95b98137c6270d343bde2b6f996b9dfea60d822666343dc616bdb84bc2421f8a4dd9d2faad2f8c5ae35c95a6f5f47e11e5ca0520e0b332d369c48ed1c96f1b104dba864a986df4818678b2881821588b5d53a23d3e49661441937300b9e19aaffdb9debce1856617d83dd36467cee780ef465021a15b0b7b069ec3e2de512572e1bcb78acadf3913b5dd8d281cba09aadefb35a0e02337fb863f5eff9166283237322542813f47d5aa8f83d638a4628145ce00a3548e5991e0ebc9f87b80a5d3db9515ef277930b7793d5826dd8b30f94b14f7a465ffa1716e0bf84c9ebafd85e76b34ec8bc7189989b5c6c694ab6b52ff5907ecff2c5617b26446bd63a951c6806b59e547e0a51408d1607db488f20496e0c23a7ddf14764218496425a6b107d6e620751c4a25a11f3af81df6c069c02050104ecb3d74c174b896c4a5f6800f543d15", 0x2000, &(0x7f0000000d80)={&(0x7f0000000280)={0x50, 0xffffffffffffff90, 0xff, {0x7, 0x22, 0x0, 0x40, 0x1, 0x1, 0x6, 0x3f}}, &(0x7f0000000300)={0x18, 0x0, 0x1ff, {0x5}}, &(0x7f0000000340)={0x18, 0x0, 0x4, {0x800}}, &(0x7f0000000380)={0x18, 0x0, 0x2, {0xffffff7f}}, &(0x7f00000003c0)={0x18, 0x0, 0x20, {0xff}}, &(0x7f0000000400)={0x28, 0x0, 0x5, {{0x40, 0x0, 0x1, r5}}}, &(0x7f0000000440)={0x60, 0xffffffffffffffda, 0x5, {{0x6, 0x2, 0x39, 0x1000, 0x6c4, 0x0, 0xffffffff, 0x1}}}, &(0x7f00000004c0)={0x18, 0xfffffffffffffffe, 0xffff, {0x7}}, &(0x7f0000000500)={0x1d, 0x0, 0x1800, {'net/mcfilter\x00'}}, &(0x7f0000000540)={0x20, 0x0, 0x55c8, {0x0, 0x14}}, &(0x7f0000000580)={0x78, 0x0, 0x5, {0xb6a, 0x2, 0x0, {0x0, 0x6, 0xffffffffffff8000, 0x9, 0x67e9, 0x1f, 0x20, 0xffffffff, 0x3, 0x2000, 0x101, 0x0, 0x0, 0x10001}}}, &(0x7f0000000600)={0x90, 0x0, 0x6d, {0x0, 0x1, 0x6, 0x0, 0x7, 0xfffffcab, {0x0, 0x9, 0x1, 0x10001, 0x2d, 0x3, 0x400, 0x1f, 0xaffe, 0x1000, 0x6, 0xee01, 0xee01, 0x2, 0xc6}}}, &(0x7f00000006c0)={0x30, 0x0, 0x1, [{0x2, 0x0, 0x1, 0x8, ':'}]}, &(0x7f0000000940)={0x298, 0xfffffffffffffffe, 0x5, [{{0x1, 0x2, 0x80000000, 0x727b, 0x2, 0x609d, {0x1, 0x800, 0x7, 0x2, 0x4, 0x2, 0x8, 0x3, 0x19b0, 0x6000, 0x3f, 0xee00, 0xee01, 0x2, 0x6a3}}, {0x3, 0x8, 0x7, 0x7, '\\-|\a^\xd1\n'}}, {{0x5, 0x3, 0xffff, 0x5, 0xffff, 0xa000, {0x0, 0xffffffff, 0x82, 0xfffffffffffffff9, 0x6, 0x8, 0xb8, 0x101, 0x8, 0x0, 0x8, 0xee01, 0x0, 0xbee3}}, {0x5, 0xffffffffffff65a1, 0x1, 0x0, '&'}}, {{0x3, 0x1, 0x6, 0xfff, 0x3, 0x1, {0x2, 0x4, 0xfff, 0x3, 0x6, 0x0, 0x4, 0xff, 0x9, 0x1000, 0x434a, r6, 0xee01, 0xcbd4, 0x1ff}}, {0x1, 0x3, 0x1, 0x2, '@'}}, {{0x6, 0x3, 0xfff, 0x100000001, 0x7, 0x10001, {0x6, 0x5, 0x5, 0x3, 0x5116d910, 0x4, 0x0, 0x5de, 0x0, 0xa000, 0x5, 0x0, 0xee01, 0x7, 0x7}}, {0x3, 0x2, 0x9, 0xfbc0, '(:]),&(@&'}}]}, &(0x7f0000000c80)={0xa0, 0xffffffffffffffda, 0xde6000000000, {{0x0, 0x1, 0x2, 0x40, 0x4, 0x7, {0x2, 0x800, 0x27a, 0x2, 0x3ff, 0x78f, 0x7, 0x200, 0x3, 0x2000, 0x35e0, 0xffffffffffffffff, r7, 0x0, 0x7f}}, {0x0, 0x1a}}}, &(0x7f0000000d40)={0x20, 0x0, 0x8001, {0xfffff801, 0x0, 0x3cb8494, 0x4}}}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x3, 0x2, 0x80, 0x0, 0x2, 0x14810, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xd7, 0x1, @perf_config_ext={0xffffffff, 0x3f}, 0x8000, 0x7ff, 0x0, 0x3, 0x2, 0x401, 0x34b4, 0x0, 0x3, 0x0, 0x20}, r3, 0xc, r1, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @multicast1}}, 0x2, 0xefb, 0x3, 0x0, 0x20, 0x2, 0x9}, &(0x7f0000000080)=0x9c) 20:27:25 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [], 0x5}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:25 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000180000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:25 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x1c00]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2746.284880][T19146] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:25 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x9c, {0xa}}, {0x24}}}}, 0x278) 20:27:25 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x8801]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:25 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x5a01, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2746.514445][T19162] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. 20:27:25 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000190000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:25 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [], 0x11}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2746.711475][T19162] bridge0: port 4(‘|‚ªu) entered disabled state [ 2746.767846][T19165] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2746.779368][T19165] bridge0: port 4(‘|‚ªu) entered blocking state [ 2746.785865][T19165] bridge0: port 4(‘|‚ªu) entered forwarding state [ 2746.793404][T19165] A link change request failed with some changes committed already. Interface ‘|‚ªu may have been left with an inconsistent configuration, please check. 20:27:25 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0xb8, {0xa}}, {0x24}}}}, 0x278) 20:27:26 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x6e02, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:26 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x8801]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2746.971783][T19197] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2747.331815][T19165] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2747.341745][T19162] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2747.480820][T19162] bridge0: port 4(‘|‚ªu) entered disabled state [ 2747.542263][T19220] set_target_v0_checkentry: 23 callbacks suppressed [ 2747.542329][T19220] Cannot find del_set index 0 as target [ 2747.691805][T19235] Cannot find del_set index 0 as target 20:27:27 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2}, 0x14) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000040)="3900000013001104680907000000000f0000ff3f04000000170a001700000000040037000a00030014917c82aa75b9a64411f6a4ee1ee438d2", 0x39}], 0x1) 20:27:27 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [], 0x1d}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:27 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x8800, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:27 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a0104000000000000021c0000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:27 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x8801]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:27 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x15a, {0xa}}, {0x24}}}}, 0x278) [ 2748.596001][T19251] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2748.629095][T19253] Cannot find del_set index 0 as target [ 2748.632819][T19254] Cannot find del_set index 0 as target [ 2748.649663][T19250] Cannot find del_set index 0 as target [ 2748.739609][T19244] cgroup: fork rejected by pids controller in /system.slice/ssh.service 20:27:27 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x8801, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2748.785998][T19265] Cannot find del_set index 0 as target [ 2748.814650][T19303] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2748.916174][T19310] bridge0: port 4(‘|‚ªu) entered blocking state [ 2748.922658][T19310] bridge0: port 4(‘|‚ªu) entered forwarding state [ 2748.930854][T19310] A link change request failed with some changes committed already. Interface ‘|‚ªu may have been left with an inconsistent configuration, please check. 20:27:28 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x88]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:28 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [], 0x88}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:28 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a0104000000000000001f0000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:28 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x188, {0xa}}, {0x24}}}}, 0x278) [ 2749.244830][T19315] Cannot find del_set index 0 as target 20:27:28 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x9c00, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2749.299824][T19303] bridge0: port 4(‘|‚ªu) entered disabled state [ 2749.319871][T19326] Cannot find del_set index 0 as target [ 2749.426134][T19335] Cannot find del_set index 0 as target 20:27:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000040)="3900000013001104680907000000000f0000ff3f04000000170a001700000000040037000a00030014917c82aa75b9a64411f6a4ee1ee438d2", 0x39}], 0x1) r1 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r1, 0x80489439, &(0x7f0000000080)) 20:27:28 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x15]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:28 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [], 0xff}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:28 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x1b8, {0xa}}, {0x24}}}}, 0x278) 20:27:28 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000600000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:28 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x15]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2749.792469][T19348] Cannot find del_set index 0 as target [ 2749.830516][T19356] bridge0: port 4(‘|‚ªu) entered blocking state [ 2749.836935][T19356] bridge0: port 4(‘|‚ªu) entered forwarding state [ 2749.845301][T19356] A link change request failed with some changes committed already. Interface ‘|‚ªu may have been left with an inconsistent configuration, please check. 20:27:29 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:29 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000ffffff9e0000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:29 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0xb800, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:29 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x25c, {0xa}}, {0x24}}}}, 0x278) [ 2750.336258][T19356] bridge0: port 4(‘|‚ªu) entered disabled state [ 2750.532555][T19402] __nla_validate_parse: 9 callbacks suppressed [ 2750.532576][T19402] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:29 executing program 0: r0 = syz_io_uring_complete(0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[], 0x230}}, 0x40800) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r3 = socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x3, 0x7, 0x6, 0x88, r2, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) writev(r3, &(0x7f0000000200)=[{&(0x7f0000000100)="390000001300090468fe07000000d90c0000000000000000480000102000000004002b000a00010014a4ee1ee438d2fd000000000086437200", 0x39}, {&(0x7f0000000180)="95390ee03e1580f2fd05438068eeadcf0d09688ec40ddf37c4d0a9e6322981bb8c7761687b51625b1e8b774b538a42585f2749900abae4a56f5d799cdbbdcda71085bc60", 0x44}], 0x2) writev(r3, &(0x7f0000001300)=[{&(0x7f0000000040)="3900000013001104680907000000000f0000ff3f04000000170a001700000000040037000a00030014917c82aa75b9a64411f6a4ee1ee438d2", 0x39}], 0x1) sendmsg$NFT_BATCH(r0, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWCHAIN={0x58, 0x3, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0xa}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x44d171fc}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x5a227c5a}]}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_DELOBJ={0x34, 0x14, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELCHAIN={0x48, 0x5, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffc}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_COUNTERS={0x10, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}]}]}, @NFT_MSG_NEWCHAIN={0x50, 0x3, 0xa, 0x201, 0x0, 0x0, {0xc, 0x0, 0x7}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffd}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffd}, @NFTA_CHAIN_HOOK={0x20, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'geneve1\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x1}]}]}, @NFT_MSG_DELFLOWTABLE={0x2c, 0x18, 0xa, 0x801, 0x0, 0x0, {0x2, 0x0, 0x7}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_DELFLOWTABLE={0x2c, 0x18, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, @NFT_MSG_DELSETELEM={0x48, 0xe, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x1ec}}, 0x4044010) r4 = openat$zero(0xffffff9c, &(0x7f0000000500), 0x100, 0x0) sync_file_range(r4, 0x7f, 0x4, 0x0) 20:27:29 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [], 0x0, 0x2}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:29 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x26e, {0xa}}, {0x24}}}}, 0x278) 20:27:29 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0xb801, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:29 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a01040000000000000ea40000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:30 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [], 0x0, 0x3}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2751.109876][ T10] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 20:27:30 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x300, {0xa}}, {0x24}}}}, 0x278) [ 2751.222556][T19459] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2751.250999][T19442] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2751.260299][T19447] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2751.271765][T19447] bridge0: port 4(‘|‚ªu) entered blocking state [ 2751.278192][T19447] bridge0: port 4(‘|‚ªu) entered forwarding state [ 2751.285751][T19447] A link change request failed with some changes committed already. Interface ‘|‚ªu may have been left with an inconsistent configuration, please check. [ 2751.472783][ T10] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2751.713691][ T10] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2751.794582][T19442] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2751.804049][T19447] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2751.883913][ T10] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2753.765298][ T10] device hsr_slave_0 left promiscuous mode [ 2753.806621][ T10] device hsr_slave_1 left promiscuous mode [ 2753.852497][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2753.860071][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2753.973568][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2753.981392][ T10] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2754.065831][ T10] device bridge_slave_1 left promiscuous mode [ 2754.073295][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 2754.178821][ T10] device bridge_slave_0 left promiscuous mode [ 2754.186382][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 2754.363939][ T10] device veth1_macvtap left promiscuous mode [ 2754.370771][ T10] device veth0_macvtap left promiscuous mode [ 2754.376939][ T10] device veth1_vlan left promiscuous mode [ 2754.383234][ T10] device veth0_vlan left promiscuous mode [ 2755.975019][ T10] team0 (unregistering): Port device team_slave_1 removed [ 2756.082097][ T10] team0 (unregistering): Port device team_slave_0 removed [ 2756.204247][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2756.293707][ T10] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2756.860818][ T10] bond0 (unregistering): Released all slaves [ 2764.761087][T19571] chnl_net:caif_netlink_parms(): no params data found [ 2765.023625][T19571] bridge0: port 1(bridge_slave_0) entered blocking state [ 2765.030850][T19571] bridge0: port 1(bridge_slave_0) entered disabled state [ 2765.039125][T19571] device bridge_slave_0 entered promiscuous mode [ 2765.051223][T19571] bridge0: port 2(bridge_slave_1) entered blocking state [ 2765.058302][T19571] bridge0: port 2(bridge_slave_1) entered disabled state [ 2765.066599][T19571] device bridge_slave_1 entered promiscuous mode [ 2765.108559][T19571] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2765.127904][T19571] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2765.328891][T19571] team0: Port device team_slave_0 added [ 2765.392694][T19571] team0: Port device team_slave_1 added [ 2765.513606][T19571] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2765.520819][T19571] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2765.546980][T19571] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2765.761919][T19571] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2765.768901][T19571] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2765.795078][T19571] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2765.929490][ T2733] Bluetooth: hci3: command 0x0409 tx timeout [ 2766.152225][T19571] device hsr_slave_0 entered promiscuous mode [ 2766.202685][T19571] device hsr_slave_1 entered promiscuous mode [ 2766.259549][T19571] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2766.267170][T19571] Cannot create hsr debugfs directory [ 2767.050058][T19571] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2767.100514][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2767.108434][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2767.152978][T19571] 8021q: adding VLAN 0 to HW filter on device team0 [ 2767.196491][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2767.205556][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2767.214236][ T6113] bridge0: port 1(bridge_slave_0) entered blocking state [ 2767.221422][ T6113] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2767.339934][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2767.349231][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2767.358664][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2767.367293][ T6113] bridge0: port 2(bridge_slave_1) entered blocking state [ 2767.374485][ T6113] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2767.382318][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2767.391300][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2767.400267][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2767.409748][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2767.494187][T19571] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2767.504646][T19571] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2767.674238][T19571] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2767.711941][ T6116] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2767.720402][ T6116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2767.729367][ T6116] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2767.738037][ T6116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2767.746596][ T6116] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2767.755401][ T6116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2767.763928][ T6116] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2767.772469][ T6116] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2767.779993][ T6116] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2767.989725][ T5] Bluetooth: hci3: command 0x041b tx timeout [ 2768.010407][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2768.018305][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2768.027438][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2768.036776][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2768.045355][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2768.054271][T19571] device veth0_vlan entered promiscuous mode [ 2768.121165][T19571] device veth1_vlan entered promiscuous mode [ 2768.221599][ T6116] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2768.229694][ T6116] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2768.237647][ T6116] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2768.245965][ T6116] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2768.280357][T19571] device veth0_macvtap entered promiscuous mode [ 2768.312933][T19571] device veth1_macvtap entered promiscuous mode [ 2768.360471][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2768.369170][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2768.378445][ T6113] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2768.432702][T19571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2768.443521][T19571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2768.453484][T19571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2768.464094][T19571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2768.474512][T19571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2768.485049][T19571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2768.494923][T19571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 2768.505419][T19571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2768.516684][T19571] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2768.529715][ T6118] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2768.538037][ T6118] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2768.546916][ T6118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2768.933480][T19571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2768.944054][T19571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2768.954089][T19571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2768.964722][T19571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2768.974747][T19571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2768.985376][T19571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2768.995813][T19571] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 2769.006449][T19571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2769.017675][T19571] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2769.026869][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2769.035698][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2769.633369][ T1058] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2769.641964][ T1058] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2769.654606][ T6118] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2769.811601][ T1058] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2769.820065][ T1058] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2769.833528][ T6118] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2770.071066][ T8218] Bluetooth: hci3: command 0x040f tx timeout [ 2770.264082][T20026] set_target_v0_checkentry: 11 callbacks suppressed [ 2770.264147][T20026] Cannot find del_set index 0 as target 20:27:49 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:49 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x40000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:49 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [], 0x0, 0x5}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:49 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x30c, {0xa}}, {0x24}}}}, 0x278) 20:27:49 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000fffffff00000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) writev(r0, &(0x7f0000001300), 0x0) [ 2770.472270][T20037] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2770.556002][T20044] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2770.576760][T20036] Cannot find del_set index 0 as target 20:27:49 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x700, {0xa}}, {0x24}}}}, 0x278) 20:27:49 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1a23ec, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:49 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [], 0x0, 0x11}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2770.714179][T20037] bridge0: port 4(‘|‚ªu) entered disabled state [ 2770.779925][T20037] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. 20:27:50 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000fffffff50000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:50 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2771.007053][T20074] Cannot find del_set index 0 as target 20:27:50 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0xc03, {0xa}}, {0x24}}}}, 0x278) 20:27:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syncfs(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000080)={{0x4, 0x5}, {0x7, 0x7f}, 0x2, 0x1}) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000100000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000000000000000008000a40000000010900020073797a31000000000900010073797a40000000000000004000000002ac01118008000100636d7000a00102800800024000000001000001400000000e080001400180fffffffc0900020073797a320000000008000180fffffffb0900020073797a31000000000800df3f000000dc00"/210], 0x230}}, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40047602, &(0x7f00000000c0)=0x2) writev(r1, &(0x7f0000001300)=[{&(0x7f0000000040)="3900000013001104680907000000000f0000ff3f04000000170a001700000000040037000a00030014917c82aa75b9a64411f6a4ee1ee438d2", 0x39}], 0x1) [ 2771.207219][T20085] Cannot find del_set index 0 as target 20:27:50 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x200000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2771.330256][T20096] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. 20:27:50 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2771.421608][T20109] Cannot find del_set index 0 as target 20:27:50 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [], 0x0, 0x1d}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:50 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x1100, {0xa}}, {0x24}}}}, 0x278) [ 2771.506531][T20120] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2771.576952][T20122] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2771.587714][T20122] bridge0: port 4(‘|‚ªu) entered blocking state [ 2771.594217][T20122] bridge0: port 4(‘|‚ªu) entered forwarding state [ 2771.601936][T20122] A link change request failed with some changes committed already. Interface ‘|‚ªu may have been left with an inconsistent configuration, please check. 20:27:50 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000000000000900010073797a3000000000e8010000090a010400000000000001fc0000000008000a40000000010900020073797a31000000000900010073797a300000000008000540000000"], 0x230}}, 0x0) dup3(r0, r1, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000040)='cpu.pressure\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000"], 0x230}}, 0x0) 20:27:50 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x0, 0x5a01]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:51 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x1000000, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:51 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [], 0x0, 0x88}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2771.969275][T20146] Cannot find del_set index 0 as target 20:27:51 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r3 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r3, &(0x7f0000002600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0xa, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x10, 0xee39, 0x3}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x1500, {0xa}}, {0x24}}}}, 0x278) [ 2772.148145][T20164] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2772.158080][ T5] Bluetooth: hci3: command 0x0419 tx timeout [ 2772.208527][T20161] Cannot find del_set index 0 as target [ 2772.235953][T20122] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.0'. 20:27:51 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', 0x0}) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) r2 = socket(0x1d, 0x0, 0x6) recvmmsg$unix(r2, &(0x7f0000002600), 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', 0x0}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff, [0x0, 0x0, 0xffffffff]}, {0x0, [0x0, 0x0, 0x15000000]}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) 20:27:51 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl0\x00', 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x4437}}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="804000000840ad856fd10f00ff0100100a000100d0bbbbbbbba000006321ab6cf5b81a8b0490326241db00000000000056ace5a874d88db5ceff098484"], 0x34}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000002980)={'ip6_vti0\x00', &(0x7f0000002900)={'syztnl0\x00', 0x0, 0x4, 0x7f, 0xc8, 0x81, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8, 0x0, 0xee39}}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x8, 0xe8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x5, 0x21c, 0xb8, 0x0, 0xb8, 0xb8, 0xffffff7f, 0x188, 0x188, 0x188, 0x188, 0x188, 0x42f, 0x0, {[{{@ip={@multicast1=0xe000e400, @remote={0xac, 0x14, 0xb}}, 0xa0000e4, 0x70, 0xb8, 0x10, {0x900000000000000, 0x3e00000000000000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x1000000}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'bridge_slave_0\x00'}, 0x0, 0x70, 0xd0, 0xa600, {0xec00000000000000}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0x0, [], 0x0, 0xff}}}}], {{'\x00', 0x0, 0x70, 0x94, 0x0, {0xa}}, {0x24}}}}, 0x278) [ 2772.539279][T20187] Cannot find del_set index 0 as target [ 2778.722845][ T1196] ieee802154 phy0 wpan0: encryption failed: -22 [ 2778.729220][ T1196] ieee802154 phy1 wpan1: encryption failed: -22 [ 2789.918243][T20192] Cannot find del_set index 0 as target [ 2849.245511][ T1196] ieee802154 phy0 wpan0: encryption failed: -22 [ 2849.251851][ T1196] ieee802154 phy1 wpan1: encryption failed: -22 [ 2912.832651][ T1196] ieee802154 phy0 wpan0: encryption failed: -22 [ 2912.839021][ T1196] ieee802154 phy1 wpan1: encryption failed: -22 [ 2970.311197][ T27] INFO: task syz-executor.1:18532 blocked for more than 145 seconds. [ 2970.323118][ T27] Not tainted 5.15.0-syzkaller #0 [ 2970.328781][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2970.337493][ T27] task:syz-executor.1 state:D stack:28056 pid:18532 ppid: 6517 flags:0x20004006 [ 2970.346764][ T27] Call Trace: [ 2970.350051][ T27] [ 2970.352992][ T27] __schedule+0xa9a/0x4940 [ 2970.357494][ T27] ? io_schedule_timeout+0x180/0x180 [ 2970.362799][ T27] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 2970.368663][ T27] ? lockdep_hardirqs_on+0x79/0x100 [ 2970.373876][ T27] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 2970.379741][ T27] schedule+0xd2/0x260 [ 2970.383834][ T27] synchronize_rcu_expedited+0x5a8/0x620 [ 2970.389605][ T27] ? rcu_exp_wait_wake+0xe50/0xe50 [ 2970.394741][ T27] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2970.400785][ T27] ? finish_wait+0x270/0x270 [ 2970.405459][ T27] ? perf_trace_lock+0xeb/0x4d0 [ 2970.410365][ T27] ? check_path.constprop.0+0x50/0x50 [ 2970.415763][ T27] ? find_held_lock+0x2d/0x110 [ 2970.420580][ T27] ? packet_release+0xa25/0xcc0 [ 2970.425531][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 2970.430447][ T27] synchronize_rcu+0x132/0x190 [ 2970.435232][ T27] ? synchronize_rcu_expedited+0x620/0x620 [ 2970.441096][ T27] ? __mutex_unlock_slowpath+0x157/0x5e0 [ 2970.446793][ T27] ? wait_for_completion_io+0x270/0x270 [ 2970.452377][ T27] ? mutex_is_locked+0xe/0x40 [ 2970.457111][ T27] synchronize_net+0x4a/0x50 [ 2970.461762][ T27] packet_release+0xa2a/0xcc0 [ 2970.466466][ T27] ? packet_recvmsg+0x1150/0x1150 [ 2970.471560][ T27] ? down_write+0xde/0x150 [ 2970.475995][ T27] ? __down_timeout+0x10/0x10 [ 2970.480725][ T27] ? locks_remove_file+0x2f7/0x570 [ 2970.485915][ T27] ? fcntl_setlk+0xd00/0xd00 [ 2970.490564][ T27] __sock_release+0xcd/0x280 [ 2970.495178][ T27] sock_close+0x18/0x20 [ 2970.499385][ T27] __fput+0x286/0x9f0 [ 2970.503381][ T27] ? __sock_release+0x280/0x280 [ 2970.508294][ T27] task_work_run+0xdd/0x1a0 [ 2970.512915][ T27] do_exit+0xc14/0x2b40 [ 2970.517174][ T27] ? mm_update_next_owner+0x7a0/0x7a0 [ 2970.522564][ T27] ? lock_downgrade+0x6e0/0x6e0 [ 2970.527478][ T27] do_group_exit+0x125/0x310 [ 2970.532091][ T27] get_signal+0x47d/0x21d0 [ 2970.536638][ T27] ? perf_trace_lock+0xeb/0x4d0 [ 2970.541515][ T27] arch_do_signal_or_restart+0x2a9/0x1c40 [ 2970.547368][ T27] ? do_futex+0x10c/0x390 [ 2970.551761][ T27] ? __ia32_sys_get_robust_list+0x420/0x420 [ 2970.557718][ T27] ? find_held_lock+0x2d/0x110 [ 2970.562508][ T27] ? get_sigframe_size+0x10/0x10 [ 2970.567515][ T27] ? __ia32_sys_futex_time32+0x1ac/0x440 [ 2970.573186][ T27] ? __x64_sys_futex_time32+0x460/0x460 [ 2970.578794][ T27] exit_to_user_mode_prepare+0x17d/0x290 [ 2970.584449][ T27] syscall_exit_to_user_mode+0x19/0x60 [ 2970.589972][ T27] __do_fast_syscall_32+0x72/0xf0 [ 2970.595030][ T27] do_fast_syscall_32+0x2f/0x70 [ 2970.599942][ T27] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 2970.606293][ T27] RIP: 0023:0xf6eb1549 [ 2970.610405][ T27] RSP: 002b:00000000f44ab67c EFLAGS: 00000296 ORIG_RAX: 00000000000000f0 [ 2970.618966][ T27] RAX: fffffffffffffe00 RBX: 00000000f700dfa8 RCX: 0000000000000080 [ 2970.626987][ T27] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000f700dfac [ 2970.635492][ T27] RBP: 0000000000000081 R08: 0000000000000000 R09: 0000000000000000 [ 2970.643516][ T27] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2970.651541][ T27] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2970.659582][ T27] [ 2978.187403][ T1196] ieee802154 phy0 wpan0: encryption failed: -22 [ 2978.193752][ T1196] ieee802154 phy1 wpan1: encryption failed: -22